Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 10:50
Static task
static1
Behavioral task
behavioral1
Sample
b839c3240732a37cdee7013781ca44bf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b839c3240732a37cdee7013781ca44bf_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b839c3240732a37cdee7013781ca44bf_JaffaCakes118.html
-
Size
8KB
-
MD5
b839c3240732a37cdee7013781ca44bf
-
SHA1
180273b05997a45a470a6dfb06b9292052129e2a
-
SHA256
bd95ee1a2baa891fd571086681884d59c8d44029772758877218a7efb1c2c0da
-
SHA512
3e8db347e75331c4d843fd534f39adf4d41f7ac7b0b1194284dd868b28024298ad868b2515e5e65264b463af6d40e5382450b4d376ccae354fedf319a179dbef
-
SSDEEP
192:5UU4N9xAH2kXcviAAkC0cCrZEcWhPyaAuhcWNM4w41X2R43Jl:5CN9xA3AdgcWm41XVf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4416 msedge.exe 4416 msedge.exe 4200 msedge.exe 4200 msedge.exe 3036 identity_helper.exe 3036 identity_helper.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe 2620 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4200 wrote to memory of 840 4200 msedge.exe 82 PID 4200 wrote to memory of 840 4200 msedge.exe 82 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 3916 4200 msedge.exe 83 PID 4200 wrote to memory of 4416 4200 msedge.exe 84 PID 4200 wrote to memory of 4416 4200 msedge.exe 84 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85 PID 4200 wrote to memory of 2888 4200 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b839c3240732a37cdee7013781ca44bf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97d9546f8,0x7ff97d954708,0x7ff97d9547182⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5736 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4476 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,8297397655481685352,6567955800884841977,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a8e767fd33edd97d306efb6905f93252
SHA1a6f80ace2b57599f64b0ae3c7381f34e9456f9d3
SHA256c8077a9fc79e2691ef321d556c4ce9933ca0570f2bbaa32fa32999dfd5f908bb
SHA51207b748582fe222795bce74919aa06e9a09025c14493edb6f3b1f112d9a97ac2225fe0904cac9adf2a62c98c42f7877076e409803014f0afd395f4cc8be207241
-
Filesize
152B
MD5439b5e04ca18c7fb02cf406e6eb24167
SHA1e0c5bb6216903934726e3570b7d63295b9d28987
SHA256247d0658695a1eb44924a32363906e37e9864ba742fe35362a71f3a520ad2654
SHA512d0241e397060eebd4535197de4f1ae925aa88ae413a3a9ded6e856b356c4324dfd45dddfef9a536f04e4a258e8fe5dc1586d92d1d56b649f75ded8eddeb1f3e2
-
Filesize
5KB
MD57e49bbf468d18a9c57ba6634bea88ccc
SHA18d46d496fd9f635d065804b1da5aa1c557560ffc
SHA256e6d17e6c2c9ff680a88b1b3b1dbe3977377911b489764781c58640b3709b5a7d
SHA512f91acf9c0ef753a32a86350b3afc47f0ab9359db78d5e5ed2425aaddcec371018d29c307156ef2251c39c63104701e7c78b31623511a67c9e400bc052f118fa4
-
Filesize
5KB
MD535b1fd476365641b5230a07f3c4bf42c
SHA134d62643fa0eea4c12f650598f36275b8d6f6fcb
SHA2564b4916ad2b7a03168f63f498d2f096be84ae572456479cd63fd75cef6c6e1871
SHA512c48c2e10d410a38fe00b038901abcda7fe1fd2da32acfbf1bdaf19633c95f1287d90b60078e3616a5c26b97967e2a783006ff7a12c3883bfa15d0337d97792be
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5b563926b3deb001bb94c9d7fa517a68d
SHA144cb9b0ba164c314fc060b308c2d7a9ef418b06a
SHA256e4b39f2c91dfac9d77d5547b6a0841b35b2f55986698d277549ba74a39360eb6
SHA5124715eb03b0cbe772b0515566e208ec08d0566e8a529b89f2e98d8da75af3ed0c9b13a19b4236bf0679af928d25ccb885ceaee896b5c07e4717fc5078e4ef8b4e