Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 11:43
Static task
static1
Behavioral task
behavioral1
Sample
b86ff0bbf7f10b34e53da59e0c3039f0_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b86ff0bbf7f10b34e53da59e0c3039f0_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
b86ff0bbf7f10b34e53da59e0c3039f0_JaffaCakes118.html
-
Size
45KB
-
MD5
b86ff0bbf7f10b34e53da59e0c3039f0
-
SHA1
5dbe26e969f81f5cd2f92d49b06d6c965880c18c
-
SHA256
66265ab92ed9936e1ccbb5b2377668145512daf5ad1d805599461bf529ca021f
-
SHA512
73e61f52a80aaee12c7d760e93b9065044a078fc48b7d33b3dc80a342d75355958f6364bd9918b908dc757dfe4a65ce378a698ffd4a63b711fcf85bbeb392012
-
SSDEEP
768:xQlxtp2ltJydgCgLiwKgSHC9hkny0+wn9A:xQlxtp2JydgCgLiwKgOC9hkn1+wn9A
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 932 msedge.exe 932 msedge.exe 4480 msedge.exe 4480 msedge.exe 2312 identity_helper.exe 2312 identity_helper.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 1800 4480 msedge.exe 82 PID 4480 wrote to memory of 1800 4480 msedge.exe 82 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 3532 4480 msedge.exe 83 PID 4480 wrote to memory of 932 4480 msedge.exe 84 PID 4480 wrote to memory of 932 4480 msedge.exe 84 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85 PID 4480 wrote to memory of 4488 4480 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b86ff0bbf7f10b34e53da59e0c3039f0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc199446f8,0x7ffc19944708,0x7ffc199447182⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,3383922075729046006,1964334486106861675,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,3383922075729046006,1964334486106861675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,3383922075729046006,1964334486106861675,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3383922075729046006,1964334486106861675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3383922075729046006,1964334486106861675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,3383922075729046006,1964334486106861675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 /prefetch:82⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,3383922075729046006,1964334486106861675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4884 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3383922075729046006,1964334486106861675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3383922075729046006,1964334486106861675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3383922075729046006,1964334486106861675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,3383922075729046006,1964334486106861675,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,3383922075729046006,1964334486106861675,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD58ecaf2cb69053874bf5a1ad250252d1e
SHA107bb80b6131d1657ec7b59b992d629b378b34e47
SHA25616df69d1adc2ca1cf4330fbca7ad5eda3c0d1ae6bd6a37f302dd25ca10162c3a
SHA51238c11ef461f883752900adb4e166b815d49b30099d43cb88f7c8fcd843139c130f580be2951d7ec3361e1d95ee7e36aa5430f1a31e8e7f981c8dd91aa818315f
-
Filesize
6KB
MD5d3011b5ec6dcb24505ac948f3d83c15d
SHA161a4f398838fa6df5b22b2d578fab4d5069d615a
SHA2567e98bbbc7de70ab2ad7e3b5c1ad3834bb1df99df5fb96b15ea46a0df4eb8647a
SHA5124ed560d892f5fd5f8f632c19f872891605a80a35013ca5ba0b4bae837c274fbc31e4159185492ff9efcbf30f130961211fe7cb327a0247b297d1488edf3a53af
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5467e8f0e18879d694c67a85dafd1a201
SHA1dbe13e40da786204a99cb6b1e878b802e8d63f7f
SHA25691c5b306660682bb80f8b6c114cf138690fb9945d7b240bdf19bf38e9ecad275
SHA512ea386db78a4278fa4e50fe883c37bfa4a00ed7ad30b9e29180d314c93d01399a94fe0c5ed460c2be484810f443f013d3ffae89d378d95dcdd4305ae091ddba45