Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17/08/2024, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
a330d3c2410a0cf6b8dff48daad16cbb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a330d3c2410a0cf6b8dff48daad16cbb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a330d3c2410a0cf6b8dff48daad16cbb_JaffaCakes118.html
-
Size
8KB
-
MD5
a330d3c2410a0cf6b8dff48daad16cbb
-
SHA1
6c831e0ed8a8d977147ac9340d696a587fa566e8
-
SHA256
c8e3717194721fc6eceba8c3be3c838ee8e79561415321e63a7d5525915f656a
-
SHA512
af798ec789e5964e20d90915f145191c81ae366ee713e6a871c964894aec6540fcaa92f2ca6b16416225fd35ffc5374e05e4e29d17586154dc5cda636788b924
-
SSDEEP
96:/fV0RL9VOPRAVPm/1VQ7E3z0QtdeGi51/MoTnL81+R/5l/6VwS:/fuXsPL1VQo3YWdR0TnL81Q/5l/62S
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 336 msedge.exe 336 msedge.exe 2444 identity_helper.exe 2444 identity_helper.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe 2716 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe 336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 336 wrote to memory of 656 336 msedge.exe 84 PID 336 wrote to memory of 656 336 msedge.exe 84 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1260 336 msedge.exe 85 PID 336 wrote to memory of 1488 336 msedge.exe 86 PID 336 wrote to memory of 1488 336 msedge.exe 86 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87 PID 336 wrote to memory of 1140 336 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a330d3c2410a0cf6b8dff48daad16cbb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa2e9046f8,0x7ffa2e904708,0x7ffa2e9047182⤵PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3527535315860977581,6412305548929653941,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,3527535315860977581,6412305548929653941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,3527535315860977581,6412305548929653941,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3527535315860977581,6412305548929653941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3527535315860977581,6412305548929653941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3527535315860977581,6412305548929653941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3527535315860977581,6412305548929653941,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3527535315860977581,6412305548929653941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3527535315860977581,6412305548929653941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3527535315860977581,6412305548929653941,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3527535315860977581,6412305548929653941,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3527535315860977581,6412305548929653941,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2472
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
309B
MD55fc07b025a3629c7e112fc1d8afd19e1
SHA1fae9bd197fc7a7c47efb49e113e9f81c6f15d651
SHA2564c0b035c4e5d690ae9de7fbac1b969767d33288a4140394b9f5da93328e1b3a7
SHA5122763e0703c528fe73d9972d4adc4b4ad2f993be3502a59e32e6df3792cb7225a0f150fb6d03899500473b788a762140a829d4fb1733bafcef5524c44828889d8
-
Filesize
5KB
MD55a8f14227a4a433c173563eecbe2190a
SHA1d1d8ebd8e5a85972675347268c4d5ef4f92481ea
SHA2568d6cdfd77eca9f3ece34190e4e0a1dc36710ba81c94cd9552dfe7898d9fbe732
SHA5123bf83ffd2d08b72a1e406ac9df4782f4d22aba699e88304d6baa499cd0281a7bdc8e28720c6342b08f2c819446135b9df0e3f860e7813a0820fad5530de3eef5
-
Filesize
6KB
MD591d38fe4d9e26f42ca2b05b74487bc98
SHA1167de6360b17ee8cc4e7e8fef0403455ba0b394a
SHA256b5ab4433d732573a5ed2512e5848b7e5c4f9bb221e6272d3ee9bf49ef31c4dd1
SHA512a564c82a893f79217ec295436e2cafd290e68ba4a650a52c346459870a33ca93068ca1ff9abd29e919cfe1e0d0221892a06b3435079410d8200e5c368a56d8f3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e096e5b00644f5ccfb5a3ea9d65e1474
SHA1b6079ba04c070732fd57fc3d4695f84fac8945c2
SHA2562163f80ff353bfe6a9f67f981795e1e56ad8f7c36bc841060a0d0f30f5fedbfe
SHA5129d5ab0b798d51d8687ced0ae2a10c3e2c3a32b6bfc5cb8ffef00b5268e0e42474112ee4af5321d4773957d680eb0fdb1b6ea19fc0f0447c9fbfe2f00d3e5fe80