Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
b81fa0e05e751becd3a5d1dedcc27eb0_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b81fa0e05e751becd3a5d1dedcc27eb0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b81fa0e05e751becd3a5d1dedcc27eb0_JaffaCakes118.html
-
Size
23KB
-
MD5
b81fa0e05e751becd3a5d1dedcc27eb0
-
SHA1
4e43e0ac7e276cf180e28c513a2e92a4cda19703
-
SHA256
3fe53415a079916479f163716eac6faa7ecd9d66580a00bfd775378c745bb441
-
SHA512
d21468787b804f5bda5e7be21179e601c7c1055a14d2bb6e769f33aded15397d4f78bef394e7632e07b20e02d5d14e88349492bec5aed3ea9753d4424fe8a6bb
-
SSDEEP
384:ScNlXKqEdmyE+NzOPvFLYH+jjMl7ucL3vhXCO1VYJ8W7UztnvuvWR:SIKqEdmyE+BOPvFE6yTfhljoUBnmOR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4988 msedge.exe 4988 msedge.exe 4796 msedge.exe 4796 msedge.exe 3784 identity_helper.exe 3784 identity_helper.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe 4796 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4796 wrote to memory of 2264 4796 msedge.exe 82 PID 4796 wrote to memory of 2264 4796 msedge.exe 82 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 2356 4796 msedge.exe 83 PID 4796 wrote to memory of 4988 4796 msedge.exe 84 PID 4796 wrote to memory of 4988 4796 msedge.exe 84 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85 PID 4796 wrote to memory of 2824 4796 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b81fa0e05e751becd3a5d1dedcc27eb0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe40aa46f8,0x7ffe40aa4708,0x7ffe40aa47182⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5612443067740999349,5551871496355510082,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,5612443067740999349,5551871496355510082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,5612443067740999349,5551871496355510082,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5612443067740999349,5551871496355510082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5612443067740999349,5551871496355510082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,5612443067740999349,5551871496355510082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,5612443067740999349,5551871496355510082,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5612443067740999349,5551871496355510082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5612443067740999349,5551871496355510082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:1376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5612443067740999349,5551871496355510082,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5612443067740999349,5551871496355510082,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5612443067740999349,5551871496355510082,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4580 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD555c3646ef94ec5f381d4ce4aefda845a
SHA1770aef2c81c73058b8bfc817be2bf5ad4c136a59
SHA256ccad38722d5054a2990415c4169d3ed00f8d7f1ba84488cf989d184e9184187c
SHA5128c53b28d2e8c3ae595c48af933ff528ee683858635359fc33b0036c627e87dcfd9f7227e419c7e6206a86e3a474a51b07ca967533d4c5c43ba9ca901675f9851
-
Filesize
6KB
MD559ca83307c4a3d3b0f27a494c4cdd7d6
SHA1d9552c35cbff29a9ec3453ae800361280cbcbce2
SHA25633ca8bd8703a658f97baf784bc159d7e7e060205b1ffdae180bfbfd175e3a1a5
SHA51263e2f70f38a20693779c5330239d8d9e15b54f12e36dc08563a9355a34bf092c08b45ad3da4e1a913bc67a091c59f86b09f3067035c94c7c84a7f92df37e869b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5aaf88a355c4fe81a4810779791b911c7
SHA1b09b98111fe588bfb097b0a7d7a4cf7bd30a48dd
SHA25647612c159b9fb5a67075eb075d23bea7009950a2ebf6f191b7c93c250dcbff78
SHA5124d64a75299e611699c3ea6691c68a67924d1a1fc3a89c9de8a2ffd76fd09b9b270ef1cfd1f8e1677901f749f6dd3245db7072044d818ae7cdd13455509cd8e36