Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 09:41
Static task
static1
Behavioral task
behavioral1
Sample
1587112f846cf973703be090c78a0015_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1587112f846cf973703be090c78a0015_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
1587112f846cf973703be090c78a0015_JaffaCakes118.html
-
Size
121KB
-
MD5
1587112f846cf973703be090c78a0015
-
SHA1
218d828fa595983d28cd8435596f24b8f5e2b657
-
SHA256
4e54c323dd85f37794498a6f88cc4c0bd9d3e49b4be833fcedd73b940e594afd
-
SHA512
f92f9945e93005f1e37e9617e5afe69a69eadd1d7ee75c77af7d835d41b5ecd9f8f69a455a61bcc3b27e32ffab2b99e87ed89c05e8c121b2598948f7ce09f79c
-
SSDEEP
1536:RjcYkTAj7MUhyyUv6MmLtbWreK9VqUNkeUpd4rI:C3kjDnF+eKiUKeDE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 404 msedge.exe 404 msedge.exe 2024 msedge.exe 2024 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe 2564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe 2024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 4876 2024 msedge.exe 81 PID 2024 wrote to memory of 4876 2024 msedge.exe 81 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 4320 2024 msedge.exe 82 PID 2024 wrote to memory of 404 2024 msedge.exe 83 PID 2024 wrote to memory of 404 2024 msedge.exe 83 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84 PID 2024 wrote to memory of 1432 2024 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1587112f846cf973703be090c78a0015_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7ffd4dd946f8,0x7ffd4dd94708,0x7ffd4dd947182⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15448403995189125003,16151166926931951218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,15448403995189125003,16151166926931951218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,15448403995189125003,16151166926931951218,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15448403995189125003,16151166926931951218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15448403995189125003,16151166926931951218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15448403995189125003,16151166926931951218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15448403995189125003,16151166926931951218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,15448403995189125003,16151166926931951218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,15448403995189125003,16151166926931951218,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4940
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54b4f91fa1b362ba5341ecb2836438dea
SHA19561f5aabed742404d455da735259a2c6781fa07
SHA256d824b742eace197ddc8b6ed5d918f390fde4b0fbf0e371b8e1f2ed40a3b6455c
SHA512fef22217dcdd8000bc193e25129699d4b8f7a103ca4fe1613baf73ccf67090d9fbae27eb93e4bb8747455853a0a4326f2d0c38df41c8d42351cdcd4132418dac
-
Filesize
152B
MD5eaa3db555ab5bc0cb364826204aad3f0
SHA1a4cdfaac8de49e6e6e88b335cfeaa7c9e3c563ca
SHA256ef7baeb1b2ab05ff3c5fbb76c2759db49294654548706c7c8e87f0cde855b86b
SHA512e13981da51b52c15261ecabb98af32f9b920651b46b10ce0cc823c5878b22eb1420258c80deef204070d1e0bdd3a64d875ac2522e3713a3cf11657aa55aeccd4
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\804c65cd-c490-40c0-9afe-763b9b2e646e.tmp
Filesize111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD510133a13844642b7511af3c52f97e388
SHA15c6dc5c79add1049516c91278c9ace25843040ce
SHA256e12a0de8d4df4e93883cbf7ac33d9ce31527cad39dce3ffd7ef5e9928705519a
SHA512983328c911230ec861eb86cf6d2aa1260f73ab3e8b88f89a57be8a0b53953add80e9efad3d483303f4b013ff982488f8a18304b67142b38308f20ac9b118474d
-
Filesize
6KB
MD5fcdaa14233955d978379726197ba09f2
SHA1d8f8665d29d9eabbdb1e1187ae1b1709fbaa8fa4
SHA2563b1ac9691d4776184389172f88e57670e9a56989c3a942c38d1544772d6dd960
SHA5125d4ad44fb4a6d69c65010bca4e9cc1eeea741c4d7240af9dc0326a03a4db86859978c5f659421b29074a450db6002705a538e3da6ea18bcdd41befc1f91542a6
-
Filesize
10KB
MD5b59944fc309b2ef9ccb94a9dc73070fa
SHA1c117b1b60c5fe2fc39b248b2493339f28d39b6c3
SHA256cfcdf745e34d4e91e9bc500466d56f2997eaa926eeea8b1f8b2ec615b4c0ce63
SHA5128f071a4d4b90d59fb84cd9377dfb8d3355fef8bdeab2fba7854c9b0f051cba8aad0610eb4417a897dcf611c8a253d236291f0185830aa280f1a2dfd22b1f488d