Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 02:15
Static task
static1
Behavioral task
behavioral1
Sample
a0d66cafb86b8ee1ebbb3271cf9e89a0_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a0d66cafb86b8ee1ebbb3271cf9e89a0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a0d66cafb86b8ee1ebbb3271cf9e89a0_JaffaCakes118.html
-
Size
8KB
-
MD5
a0d66cafb86b8ee1ebbb3271cf9e89a0
-
SHA1
1bedc2368dcd6eba4248caf9e0a0c8f1af2978af
-
SHA256
359c86f008ac678784d493ed53ffdc951e75df47fd1c26518eee95937f905f49
-
SHA512
1eb580822a14f00c05d2df511219497595736a96aa42b7effc4bc33c8846a595e4d6afdab3dc9affbe5bef2822acbd16c4dc956efcd7d90f3ee4305b07222b67
-
SSDEEP
96:ByzVs+ux7UQLLY1k9o84d12ef7CSTUOBkIIwvzR4CIp7ncbZ7ru7f:Ksz7UQAYS/qvOJgnq76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1240 msedge.exe 1240 msedge.exe 3616 msedge.exe 3616 msedge.exe 4984 identity_helper.exe 4984 identity_helper.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 628 3616 msedge.exe 84 PID 3616 wrote to memory of 628 3616 msedge.exe 84 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 928 3616 msedge.exe 85 PID 3616 wrote to memory of 1240 3616 msedge.exe 86 PID 3616 wrote to memory of 1240 3616 msedge.exe 86 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87 PID 3616 wrote to memory of 1464 3616 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a0d66cafb86b8ee1ebbb3271cf9e89a0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3c4146f8,0x7ffe3c414708,0x7ffe3c4147182⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,4955949592831542877,3576270261083960691,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1952,4955949592831542877,3576270261083960691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1952,4955949592831542877,3576270261083960691,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,4955949592831542877,3576270261083960691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,4955949592831542877,3576270261083960691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,4955949592831542877,3576270261083960691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1952,4955949592831542877,3576270261083960691,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,4955949592831542877,3576270261083960691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,4955949592831542877,3576270261083960691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,4955949592831542877,3576270261083960691,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4008 /prefetch:12⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1952,4955949592831542877,3576270261083960691,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3508 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1952,4955949592831542877,3576270261083960691,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD59bf6412efc8c88894403123f2cc98fe7
SHA11d095c2ba8de1afeb780d9ef2a6c11fc3fefefb6
SHA25625b4da448b5c15a2300c9763765fb0a50bdf48ff9b583f8abf3545f1ea2289ea
SHA512594cf28087627f9e44dc5e744fa2a7d78c17bdc703c1a2c0593a82700e3846922aa19b1f75617321258cc0a5736f3663fd3400337179d7f39c4ad043cb9af50f
-
Filesize
6KB
MD5af9889c6267b67e3791c36acefd2e87f
SHA13df0199c63576479dfe5b346b5befe0783041793
SHA256c77574de842395561ed621d5d6be7a7e0d59e1092c963074974d4215aad4107e
SHA512263ac12c476282def77cf9f881fefbde1a71948bd13b21eb912e28294a0a2a1dbae1626189eb162ba629cc5ee4983f65bfba8809f1404088190aeedf603ee323
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e860024454200316f9d983b37e52bf67
SHA166e56244aade8fc72c7cfe5295bec9b36d423a08
SHA2565fdaaaed03b1f0f9265873dd19fcf07265b6b375d3bfa85bd18244c782f8d8be
SHA51212da3224b6c1ccae6403ad0b49b577fa2deabfb957d2c2b73b5489d731a9ae4c0c02e305563c21c3a5127c60c3e2fddf9c4aeaf3698b5a8fbfa4726bd92a82cc