Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
1622ecfb69be22b32c969a8635472799_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1622ecfb69be22b32c969a8635472799_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
1622ecfb69be22b32c969a8635472799_JaffaCakes118.html
-
Size
53KB
-
MD5
1622ecfb69be22b32c969a8635472799
-
SHA1
7c3cf35086e316112d5c5fd9f4a2c135ccdd753f
-
SHA256
d208d03002020e75cce756ec419dab691b73fa6e5e0231eb728a7db645863170
-
SHA512
831b846e2fd5eb91fc7bb9559c65a4c0bab964e3aa4ca175ac462e3e7532ddc7fbd9da102f74208f5b28dcdc52603f15d262ddbfcee607e1f131bd80d6786152
-
SSDEEP
1536:CkgUiIakTqGivi+PyUcrunlYG63Nj+q5VyvR0w2AzTICbbuo7/t9M/dNwIUTDmDm:CkgUiIakTqGivi+PyUcrunlYG63Nj+qC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1148 msedge.exe 1148 msedge.exe 2292 msedge.exe 2292 msedge.exe 3556 identity_helper.exe 3556 identity_helper.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe 2292 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2292 wrote to memory of 1052 2292 msedge.exe 83 PID 2292 wrote to memory of 1052 2292 msedge.exe 83 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 5020 2292 msedge.exe 84 PID 2292 wrote to memory of 1148 2292 msedge.exe 85 PID 2292 wrote to memory of 1148 2292 msedge.exe 85 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86 PID 2292 wrote to memory of 4300 2292 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1622ecfb69be22b32c969a8635472799_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaea8446f8,0x7ffaea844708,0x7ffaea8447182⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5332 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,15823038425137778135,17611479578192934271,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1260 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
403B
MD5529772c2e6641e80eb15923a8264820d
SHA19fea5df1a233d0d48aa3190a1ee3be929ff8b3e0
SHA25615757054a65f4c0c00e7be128e4db32a29a19926114fec7587ff493a3f52053b
SHA512a6b5a4ff7721c4e6c5b2cbf42372d768c827bbd11b4948b59af9f4e7edc9141ccbeb6f2e43f258ae36adaf510bbf527dbddf6b80291c029a8c04a21250b17c4d
-
Filesize
6KB
MD55f9cc1347d6d7fd81c9bff8cf7a82c5b
SHA1ad47cc0cda225e84938902d4f76f2a648e94d3f6
SHA256364bf2bb14fc6205649ced7d520984a79e95f9a945c64b41857043c6b17c2e3d
SHA512fde7bf0f4c88f9b59b354f0ab62436cfeb1f3de4f6aba6c56cf5516643f8c49824ec9a6ce5046b33282f26fc9e6bbacc3bd1ad278d96d6584966a698abe98856
-
Filesize
5KB
MD5a056c1fde408085ccde2a420d08665fe
SHA196f3616f93d6602b923844c5cb312d608c54e7cd
SHA2569d00cc8c52dafae72f416c303bf8dab5a1773cad422f79251c810da6bcbc0052
SHA51243c6ba63dc0085e14489fabe6ffcdfe24dc9f3e0375f7b6b41bacd6a9135d417c642091aec4bc6cc93966b0f8ff36169b050e2e7882c9132f5cd0c7cfaa34d33
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5d305195d2ac999ae3432739be5c69533
SHA168214ba8ccc7a3abcfc3c0c1ea0408874de4584c
SHA256729d10a605339823f3ab5e89b8833c9d1fd01e1071a12062c3edd3fe09eef8df
SHA5125d92bd5224a4dc0f72e7e34b33b91c2e1536af764425945408b6e9e9e56b3e872d40c186ba45fa579e746c697b67a0c188deae9dbb448fbbd255108ad5574860