Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2024, 00:28
Static task
static1
Behavioral task
behavioral1
Sample
181e2465e3b5a0f43d850c998ef5c1af_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
181e2465e3b5a0f43d850c998ef5c1af_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
181e2465e3b5a0f43d850c998ef5c1af_JaffaCakes118.html
-
Size
53KB
-
MD5
181e2465e3b5a0f43d850c998ef5c1af
-
SHA1
d95ab2b022dd94ec2f176bd1a477c6a64fb93c98
-
SHA256
9655e789414d22eb3834f34417b1984fc56a216f280d9ae59623b00c103ff366
-
SHA512
36e11121500e7f09392807c59e362e575b956a7d335a2bdb2286aa119b0313a6b940b4066eddee92974aeab0e73eb9097984f71bf767148f4619fca7f05aa901
-
SSDEEP
1536:CkgUiIakTqGivi+PyUqrunlY063Nj+q5VyvR0w2AzTICbbaop/t9M/dNwIUTDmDZ:CkgUiIakTqGivi+PyUqrunlY063Nj+qv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 3692 msedge.exe 3692 msedge.exe 592 identity_helper.exe 592 identity_helper.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe 3692 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3692 wrote to memory of 3148 3692 msedge.exe 82 PID 3692 wrote to memory of 3148 3692 msedge.exe 82 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 3604 3692 msedge.exe 83 PID 3692 wrote to memory of 4580 3692 msedge.exe 84 PID 3692 wrote to memory of 4580 3692 msedge.exe 84 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85 PID 3692 wrote to memory of 4128 3692 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\181e2465e3b5a0f43d850c998ef5c1af_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e90446f8,0x7ff8e9044708,0x7ff8e90447182⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5296 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4048 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2228,4555069015016883712,1160587634736860784,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:336
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5477462b6ad8eaaf8d38f5e3a4daf17b0
SHA186174e670c44767c08a39cc2a53c09c318326201
SHA256e6bbd4933b9baa1df4bb633319174de07db176ec215e71c8568d27c5c577184d
SHA512a0acc2ef7fd0fcf413572eeb94d1e38aa6a682195cc03d6eaaaa0bc9e5f4b2c0033da0b835f4617aebc52069d0a10b52fc31ed53c2fe7943a480b55b7481dd4e
-
Filesize
152B
MD5b704c9ca0493bd4548ac9c69dc4a4f27
SHA1a3e5e54e630dabe55ca18a798d9f5681e0620ba7
SHA2562ebd5229b9dc642afba36a27c7ac12d90196b1c50985c37e94f4c17474e15411
SHA51269c8116fb542b344a8c55e2658078bd3e0d3564b1e4c889b072dbc99d2b070dacbc4394dedbc22a4968a8cf9448e71f69ec71ded018c1bacc0e195b3b3072d32
-
Filesize
403B
MD5a10a293e449176666f9230feba64c7f8
SHA18f89bef30965dae174b9449c09fb90a471389f2d
SHA2563fe2bf866be5a979a1933b88ef123cda525503b20a716f0fdb0cae272b4030ec
SHA5124363e1617ed646aae446a13a6b2ad75a828825820440c8dfb5edad99e3104b70c795581a3803fa39ccf7a3b9f1a3de57604294a87e52829574fa45bc539adcf6
-
Filesize
5KB
MD54ae9eff644991232b5a27d3ecd34a119
SHA1dcf26730dfdd1797aee2dd929bfdc2c0350c7766
SHA256674c65eb76c7fd58c9659881084efa8ed9334ce20109e1429437b95c23aa928a
SHA512ec4199a695627c42f3879e0f45220498dd389dde3c4b29361188b0cf48a060c6cb8dbf95cd446a28e52e5aa2bf6e4d0b2616ab5b3fb75a23491c932692cdb536
-
Filesize
6KB
MD599024e8704f400c7048bc9a51bc819c3
SHA1cfb50c9b02434e8af3ccc7714ff49ca79810855a
SHA2563f5d9a00b868a34389be38fa0bc06c2986c1464deb19b93b91e37b40be698acb
SHA512f1787938e752837dcaaa35927af9430882ed6e1208334dd3ccadee495e156c1d86e06eaa38be289c1a392651ffc89b0468071395bfe523957746c39dc95874e5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51dc368ffcfeca576f254c97c817af792
SHA1d9f4c9f417ea93c7fb282809812bd5697248c957
SHA256696d74d8fc0822ce9eda2820d61b8594965f3a2e05fc302869cf25c915b2e0e3
SHA5128796cb565eb517b5af3d2faf74a58febaa3714af5b5ba4aed05a7a002c3a7fcab13963a7be3f2b7dbdeabd1c9e4b6843fdae6c8c86e0308f031825b6ae559e24