Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 06:35
Static task
static1
Behavioral task
behavioral1
Sample
a187ae3d055a73259262e60a7d3ac625_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a187ae3d055a73259262e60a7d3ac625_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a187ae3d055a73259262e60a7d3ac625_JaffaCakes118.html
-
Size
6KB
-
MD5
a187ae3d055a73259262e60a7d3ac625
-
SHA1
3f324a1428609a7614656fcd6c7bed4fb5d8ac2c
-
SHA256
59759017ff70e63cdbb52a73490e6593a00e3a4c36c65c259bf35987f2278e12
-
SHA512
7b37bf79da81ed481a1cae87ac50ea64f5994a12ecbc8aae2b2d042bd4209f0746e5bd0e15b540302e4ba3a55dc4eb3a35ba0220baebae79576f14bcd82f240d
-
SSDEEP
96:uzVs+ux7wHLLY1k9o84d12ef7CSTURZcEZ7ru7f:csz7wHAYS/Mb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 1192 msedge.exe 1192 msedge.exe 3804 identity_helper.exe 3804 identity_helper.exe 1996 msedge.exe 1996 msedge.exe 1996 msedge.exe 1996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe 1192 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1192 wrote to memory of 116 1192 msedge.exe 84 PID 1192 wrote to memory of 116 1192 msedge.exe 84 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2708 1192 msedge.exe 85 PID 1192 wrote to memory of 2064 1192 msedge.exe 86 PID 1192 wrote to memory of 2064 1192 msedge.exe 86 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87 PID 1192 wrote to memory of 2860 1192 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a187ae3d055a73259262e60a7d3ac625_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff636c46f8,0x7fff636c4708,0x7fff636c47182⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15256425075360017371,17088421328202555418,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15256425075360017371,17088421328202555418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,15256425075360017371,17088421328202555418,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15256425075360017371,17088421328202555418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15256425075360017371,17088421328202555418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15256425075360017371,17088421328202555418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15256425075360017371,17088421328202555418,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15256425075360017371,17088421328202555418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15256425075360017371,17088421328202555418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15256425075360017371,17088421328202555418,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5644 /prefetch:12⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15256425075360017371,17088421328202555418,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15256425075360017371,17088421328202555418,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\76cb5e54-c3dd-4da1-b906-51d445638098.tmp
Filesize6KB
MD599614a154c51af52db04a1d91a7f9d42
SHA15f35ba60e073ccfacf91619460e8fb262991ed17
SHA256f0fbd91a4495e67846d5210b797e0ec657a3549ba8e6c8509345904c21bf92e1
SHA512f75f9c99d56d4d9d18b8cf703fba78bc95ccfb305bfcd5ed65388225b4ace78c1165c2558cab0d3d49721d2a037f614bdaae9fa04a348dcbdf78696442c6bc29
-
Filesize
5KB
MD5834453436073b9098827eec6992dd30e
SHA1c5d488f7e4359c19f52175569961d3acea98f167
SHA256cd8881e31bd4304f6a259cd2218eb8a04a05bf11a75bf299ad924c039ad483b7
SHA5123e97210f3e8edcb99c66cb7e8063deff1dbda88940d430222321e7996574b7ef6bcb721e1219aa3daaf2e8dc5575454a8c35f413139357bddd5563d079db4845
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD533ae8ce6992f0b63ae28a2a7e61cc58c
SHA122be5da470e5c995eee52552971ee804542fb27a
SHA256bc5504131aeb09d9b54d4abc240cb03f052baeb728ec0d373dca72d85de6c2ca
SHA5125f8a0089849fdee599f099c4a131375bc73f350a5dc16eae6c14e02a95e23f993ae8699bf8039a3904e20843874176f4bbd2e1b4ca20bcdd416fc11f728d6983