Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
17-06-2024 12:17
Static task
static1
Behavioral task
behavioral1
Sample
b893091e16f3d6b0a9e407995803838b_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
b893091e16f3d6b0a9e407995803838b_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
b893091e16f3d6b0a9e407995803838b_JaffaCakes118.html
-
Size
73KB
-
MD5
b893091e16f3d6b0a9e407995803838b
-
SHA1
f1216895b405a3fb78984eb4fed101184b2a6e92
-
SHA256
7382de320954dab40993dba5807efa8cfd7072fcf855244878543a1724f38189
-
SHA512
35da4e65466b3f63d5a07a9a7d6f42de834b4c9ae369475052413b537bc08744a9921935b24b98c9edc38411bc89c10da9417505964d44ab410eab276f8f51ed
-
SSDEEP
768:DwIzl7u34gxIVByywWuPxXxMU8sXyeOUA0/Wvvu9dKZdtICouPD+ljct98L+JEZh:nZCJxS818deJP/UhBYg98LAYCZIQLm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 744 msedge.exe 744 msedge.exe 1644 msedge.exe 1644 msedge.exe 3388 identity_helper.exe 3388 identity_helper.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2008 1644 msedge.exe 81 PID 1644 wrote to memory of 2008 1644 msedge.exe 81 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 792 1644 msedge.exe 82 PID 1644 wrote to memory of 744 1644 msedge.exe 83 PID 1644 wrote to memory of 744 1644 msedge.exe 83 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84 PID 1644 wrote to memory of 228 1644 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b893091e16f3d6b0a9e407995803838b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdabb846f8,0x7ffdabb84708,0x7ffdabb847182⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10799353183168250099,9889667617863300035,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,10799353183168250099,9889667617863300035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,10799353183168250099,9889667617863300035,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10799353183168250099,9889667617863300035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10799353183168250099,9889667617863300035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10799353183168250099,9889667617863300035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10799353183168250099,9889667617863300035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10799353183168250099,9889667617863300035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10799353183168250099,9889667617863300035,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10799353183168250099,9889667617863300035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10799353183168250099,9889667617863300035,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10799353183168250099,9889667617863300035,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3600 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3870a11c-c9ba-435a-813d-f00902763475.tmp
Filesize6KB
MD59d647ed2c047b361e525be97d89d11dc
SHA1c7c36c686313ab2a397781e01e7e29a2625fb8fc
SHA2568fd785433df8440854a5d36db97acf02821642a1ea3b33e4bf201cae3b930252
SHA512e21753f78a114da980afb1d0a6a59744648b832cf403a3c6a0315d46c13860a514bd4ecfa11061dfbb6abe27aa3118a03f2bfb56f1c09dfaece20bf77927103f
-
Filesize
6KB
MD584bcb440de08858fbb061f99100cfcad
SHA1161b6931f18c5407b91a0d6f726971e858e802b6
SHA256dbf7ff013ea032f678497883cbf4427bc9b3af76e1161939de4941db644c62ac
SHA5122bd19f19a07e0b41f7cfa7a4a14a3b46d843bbfa958981bdd3c1ad0a8832cbacc8ee738b919b8bf7a163048c3a56126940ab33984b6cb18d647c9d7176614cf8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5de2ed34bf9d1ff5dd77bf1cbf1a2c3c5
SHA197dd701207a8858c53816333e095ce8d1608fa68
SHA256971b6ba8629416723c46fd60e6ccb0c6fe7da0dce786ab128ea6c08bdcdcf27d
SHA5128882d453c20ef5a5c978298b7fe25d656d540ef78598741dc9284ab84cbf0fa0b884528d3f2d7487fa358ef58594acdb1ea7babda61f656fa6c7ceb10212d44f