Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 06:20
Static task
static1
Behavioral task
behavioral1
Sample
a5b52240606d4b358fd54dcb51210984_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a5b52240606d4b358fd54dcb51210984_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a5b52240606d4b358fd54dcb51210984_JaffaCakes118.html
-
Size
6KB
-
MD5
a5b52240606d4b358fd54dcb51210984
-
SHA1
79ec8f0ae855beacc9c84e830067acc5b750588e
-
SHA256
15c0f1e5c7ed23e1599414c460b191e7db18d3d02d70b8771adb8c46798de9db
-
SHA512
7ba5b0f39c3f3160e4017d4209441d281e25fd781b57925b6b9f8e9c49e272db4e4a4c8d1890d23ee0ddd46f98fdb58dd8f3641596e839091cc7eba5646a703c
-
SSDEEP
96:XAZAUrjbaQVw3QEH6tP/K23ivPwBAGrDUu7Gj+Rlhk7roInPTL5fwnYrF:X8JPbaQO3haB/K2qWfl//kxPvpwnYB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 1476 msedge.exe 1476 msedge.exe 2260 identity_helper.exe 2260 identity_helper.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe 3320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe 1476 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1476 wrote to memory of 3760 1476 msedge.exe 84 PID 1476 wrote to memory of 3760 1476 msedge.exe 84 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4196 1476 msedge.exe 85 PID 1476 wrote to memory of 4404 1476 msedge.exe 86 PID 1476 wrote to memory of 4404 1476 msedge.exe 86 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87 PID 1476 wrote to memory of 1612 1476 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a5b52240606d4b358fd54dcb51210984_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe832046f8,0x7ffe83204708,0x7ffe832047182⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,12255504637430997466,15591722010047946976,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2236 /prefetch:22⤵PID:4196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,12255504637430997466,15591722010047946976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,12255504637430997466,15591722010047946976,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12255504637430997466,15591722010047946976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12255504637430997466,15591722010047946976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,12255504637430997466,15591722010047946976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,12255504637430997466,15591722010047946976,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12255504637430997466,15591722010047946976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12255504637430997466,15591722010047946976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12255504637430997466,15591722010047946976,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,12255504637430997466,15591722010047946976,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,12255504637430997466,15591722010047946976,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3292
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD535b9890ff33b7c7afb2abafc268881be
SHA12676bbaec1d06ffcaf97146a95c3f3f65c2fe103
SHA256311b89205fa3c0a2a8c1ea9dda98e498542847ac8c9a2f134b864b012dae6036
SHA51238c7f2fe9afd1872ba347466f9a1a7cbd4bcc51f8cb4c3bddfeb8011fc3a038d280a1bdbaa32a3f761c681517334fffeb9c877bb5b5d50fb5107c1233c75b2da
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD561c9dc0e6b06783a5ae6271759d0d04e
SHA129c10cb372602a921e045e1090dc34aeb1e9e349
SHA25611d7c238f64f717fe0acf032f6d2ab2651080b29059ba3d5fb46b7a877bee9d5
SHA512bda67154bb4834a245a5e97e5eb2f28cee29b88c73455d96908e138e61d2ec8a0a4cdfef9a0dbf040ff2949bfe99a9b7cde9c0da2150c89eec7357a634a64dfa
-
Filesize
6KB
MD50777ef03f087206101feafb4f16eba6c
SHA14082dabdce60c55249659857739ff3b6c7da945f
SHA256b9a292d8394d2c19a76c4a5160ca13428167763ae027f068d2fa52674dd7af65
SHA512276ac049562e282f50641209887f990a0a971ae24ff76ae55b12d977c730f4e928ea9487cd09d11c222b2e53f4a95ed921c074fef6e99bf29a26ac81ed03c5f3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389