Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
19/06/2024, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
bd6cb47df7df87fb6bfcb217c9d3f224_JaffaCakes118.html
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bd6cb47df7df87fb6bfcb217c9d3f224_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
bd6cb47df7df87fb6bfcb217c9d3f224_JaffaCakes118.html
-
Size
28KB
-
MD5
bd6cb47df7df87fb6bfcb217c9d3f224
-
SHA1
98723869dc1bfa8b16c5b59609428bb54febf54d
-
SHA256
5250e62a699924e24ea9055ee7737bbc9d7c6ded2904d5f43b9205af19c7ee7d
-
SHA512
f81bb9a5ebf8e86dcce214657497a0ab7bf45a0eca8330407d76a1ef4411b5d8f3e5e9b7024b804ac2f894b03d73e1d71102e113b50eef2d233a0f3e86adf417
-
SSDEEP
192:uwTUb5nVCjEnQjxn5Q/1nQiegNn2+tnQOkEntr/nQTbnZnQ9eeUm641+CXTQl7Ml:5Q/w+prsg+C6SD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4820 msedge.exe 4820 msedge.exe 4032 msedge.exe 4032 msedge.exe 3972 identity_helper.exe 3972 identity_helper.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe 5008 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4764 4032 msedge.exe 82 PID 4032 wrote to memory of 4764 4032 msedge.exe 82 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 1692 4032 msedge.exe 83 PID 4032 wrote to memory of 4820 4032 msedge.exe 84 PID 4032 wrote to memory of 4820 4032 msedge.exe 84 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85 PID 4032 wrote to memory of 1900 4032 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\bd6cb47df7df87fb6bfcb217c9d3f224_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc482146f8,0x7ffc48214708,0x7ffc482147182⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,3010531246604468620,4977619390145666516,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,3010531246604468620,4977619390145666516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,3010531246604468620,4977619390145666516,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3010531246604468620,4977619390145666516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3010531246604468620,4977619390145666516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,3010531246604468620,4977619390145666516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,3010531246604468620,4977619390145666516,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3010531246604468620,4977619390145666516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4104 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3010531246604468620,4977619390145666516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3010531246604468620,4977619390145666516,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,3010531246604468620,4977619390145666516,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,3010531246604468620,4977619390145666516,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1948
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
6KB
MD5f44da787a561a8c55974f86dcf6a0020
SHA1086e4e8fc13a13547e8a8d6c6ce6e64e5e8b706c
SHA256d9644ad05133cb29be9051b2cc132f8912a4a8366bb0480579435446c0684cb5
SHA512e5692e6069ec7a7ebee94cc3fec84d2a0259d7679bbaab5b982dc9a77abed88d941f5c1da6b2e04d0301b8e5017b00afc4788ae1d4d49d29437b3e3574bc0534
-
Filesize
6KB
MD5c8d0370b4df021909efb5071c33ff2d3
SHA1f3b3d8017f4de5a79ec40c7b3250d7b1ff22068c
SHA2567d104ca0e9af85ca44fd1e4450eba64017b7d6d514f33407d90699e91a778150
SHA5129d765a4a714343ebd4e3de36f93d3a7d5d244aca8432dfd17c5c9172afcae35d9af910fd3b41fd5ea4c9f4d4a9b7a135cb56609839fef654cbf2cc46208a28ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5150fb341d664b8036f44ec0e3b8c6e23
SHA164c9dbe17df7038d9639c0e147e96d05e04bceb0
SHA2562db811ff731593cb6855bc25384e70909a018de26aa03d1399255eafd4004e61
SHA512ae870a9738b17044d84b73fdabf45d67266be0e719e08080057c3042e1f0cc0ffcc044e08e49ac2befa44bcd9c85eb0ffd9404dbfbd739590517acd5cfa41338