Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
166d4571915a538381b8ed66c56672c4_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
166d4571915a538381b8ed66c56672c4_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
166d4571915a538381b8ed66c56672c4_JaffaCakes118.html
-
Size
53KB
-
MD5
166d4571915a538381b8ed66c56672c4
-
SHA1
ed337ead4ab4b183937d65beb7ab8d1958559f9a
-
SHA256
2d9576d5cad0cb54ce8526bc847feb5ef82a7f1549e3420127d15a3469c386ff
-
SHA512
62352531b4b912115a754a9f2a89d119b7fd4e25c3a705618eec10f76be7b30e17a9f33a656646c906038c2f6e0c48ea9d558b8e97ae025d9f9448d6cdbb804e
-
SSDEEP
1536:CkgUiIakTqGivi+PyUirunlYg63Nj+q5VyvR0w2AzTICbbmoN/t9M/dNwIUTDmDp:CkgUiIakTqGivi+PyUirunlYg63Nj+qj
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 872 msedge.exe 872 msedge.exe 3524 msedge.exe 3524 msedge.exe 1792 identity_helper.exe 1792 identity_helper.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe 4636 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe 3524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3524 wrote to memory of 1864 3524 msedge.exe 82 PID 3524 wrote to memory of 1864 3524 msedge.exe 82 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 4248 3524 msedge.exe 83 PID 3524 wrote to memory of 872 3524 msedge.exe 84 PID 3524 wrote to memory of 872 3524 msedge.exe 84 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85 PID 3524 wrote to memory of 4252 3524 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\166d4571915a538381b8ed66c56672c4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc482146f8,0x7ffc48214708,0x7ffc482147182⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5632 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4020 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,16913342758459779661,282670825145838912,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4636
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
403B
MD5e3fc5ec939daf6c15bb0846b886896f7
SHA12cb8131f1403d9ba86246cc2ed05ff825774f0c8
SHA25671e8004394d6926a8a9c0a8f853907257d36f61c724d03d99124da281986077f
SHA512152c8bc899b57d0136ba0111cd9f7659fad7d0f4d694cb2740dee45401b27ea26cf237ceef0645c4548a0ab9d14da5c3c821b7e48f5679957f57c159d244bc96
-
Filesize
5KB
MD5c56767de6ae1b1a8cf4269c85081e98a
SHA1d5699f66b295b9d89d3d61242af3cc89ae5dc428
SHA25602ffcf6b19b565ef24fc0e35e66f3b4fb0016cca3264eb612926ac3b80eb3e7b
SHA512542e0a0d9647e0e787ad758144c3a0975d0fb387cac52c810502fc5bf828b33eb983761a77d529e57d2efc9e9fa778104af08741d0eab021a68a857a7b8ae727
-
Filesize
6KB
MD537cf2308567f9b4a0ced73d0a7a9478f
SHA1084e1b19bd1a7eb2ff48d708f44621f8b3f769ba
SHA256282d67a18e7391724905d3c5e10976163e97599c5cfe7ce23b0e2e67651436a4
SHA5126b13442d5e60e5b1e6749f6f0e3b528ef0427de79bbc0c7fed89ab95d5475a41558e43015d04055aafa85c180c06ee24382224c00ebaf9e82ba14386a1d223e9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54b5b7cd251c88f4de83c8f9193bdd2a4
SHA116918d245182289bdb9f0b36e25ee1f9a139d469
SHA2564293f5fc48b71f8ef17436aeeeeaf0ebcaba60759f2d08df9bfca16899ee66f1
SHA512bb6bbbd72d441b0b730e686a9c95c127d431a6b0aa13f8a1aab5f8c6569ab7383796e00655f4272f96a7faaa9b11f446cc4fdfa381734c7be3a9f0f3428b1fe2