Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 08:22
Static task
static1
Behavioral task
behavioral1
Sample
aa458ca14e7c2c35566daab10817faa5_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aa458ca14e7c2c35566daab10817faa5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aa458ca14e7c2c35566daab10817faa5_JaffaCakes118.html
-
Size
20KB
-
MD5
aa458ca14e7c2c35566daab10817faa5
-
SHA1
bfad2da952547daec6981826e47e69a57a360397
-
SHA256
3034d1240c6677ae73abbc3918aed4f08a984385b1116a2589939e9d82482655
-
SHA512
4bd8d23ced2a04792ec1884bfb2fd8687d4ba22a7642e8f9402d80ee08ada532828409be0a0be97ddfdfd364ef2b3428a80ad4995722332df26fb8cd2f01f358
-
SSDEEP
384:FGEz/6Fg2Z9t5JyMKWwXAoIjdIMdi7b9ExPt:IEzHY9rJyMn6AzIYi6t
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1428 msedge.exe 1428 msedge.exe 2228 msedge.exe 2228 msedge.exe 3904 identity_helper.exe 3904 identity_helper.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2228 wrote to memory of 4472 2228 msedge.exe 86 PID 2228 wrote to memory of 4472 2228 msedge.exe 86 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 3164 2228 msedge.exe 87 PID 2228 wrote to memory of 1428 2228 msedge.exe 88 PID 2228 wrote to memory of 1428 2228 msedge.exe 88 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89 PID 2228 wrote to memory of 3108 2228 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aa458ca14e7c2c35566daab10817faa5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9afe246f8,0x7ff9afe24708,0x7ff9afe247182⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:2504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4952 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:2692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:2816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14445132154035536793,3483217497018153916,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4600 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4064
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5db38f8ed05de70942b0592e868e6545e
SHA12bab29ab14d6e7bed36073326badd2d742fa8445
SHA256677bf300a0f62cfc04df01b10aaae361e14110ed6d33c41ffdbfa7aefccaa93e
SHA512428bcef983d83c7359f662a2e970e5f276c7b5896ae6fe51834d30e355e9d0dd123f251d0cfef32dc6fe5c99c3052adab04cec718c169990c63ba59830025e8a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD567abebae9f5730209abb42a34c6bc434
SHA18103642a22d7a0ce0deac7659cf45f378ed42dc4
SHA2562cff32b0a481f0e47b77b0bbaf336f386eb9abaf0c5a9143aaec580b8d47f2fe
SHA51235a35fc7266d1e544fc4602117798c50253600380b83cd5964ac1add0ba32b5cd1f7614448a0d8446a11540d1342731bcdbd825c2f9d93be571d164a9419d556
-
Filesize
11KB
MD5abac872e75b87840ac59be5885b3de15
SHA11fad91713ddbc3d5eb9a332cd3ea25774951b83b
SHA2562e1324cc367dd058e3ca356c7e9fd0fcdb0ee032d739e531ae45982210195ff8
SHA51210fc651d0253114560f409a288e4f68ba7f4e832341850f221213502fb34654fe67c7e2e0883bdaf6f75cd0767bbf7bc6dfef2e68c8e6a363630b43de4f63bfe
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
928B
MD5439799710d218d882647c4aeaac05ece
SHA1387e0d4f3269ce452ebbec301dc590d0af82f343
SHA2569a775fb8f543481e9e5d10cd4b8f29433e02ab4a8f88f535889531fef3f86836
SHA5123116da2efc6502fccde6b75ebac7ac7e7e700d82f274b23affce1bab4df9ee42576b276c28769b88a5c9a8acf27c9a024470b7eafdf12b5093acf555196f1048
-
Filesize
6KB
MD5e449b9fb33d311b57f6a07d5927aa457
SHA180cb412b5c8280a2aa8f09e05fc6d6b8adb910cd
SHA2560f7efb99150eaddaff002d7d03fe7ccc6e39a474e6b32dc5955f8491dd0dcdfb
SHA51247e697259382987e9a8eaf9e75bd92fd9cc27a5df4ea4d0ee3b3f8da4ea716c8135d6dfc9ec2bde078c8ac1d996802ec95f187f40bd595e8a317ff90148eec9f
-
Filesize
6KB
MD56779459d1b3bb64eae59403020161335
SHA1f51688dfa45daff2536f92cecbd727bdf03f2dfe
SHA25699bcc3aced4ced845fb2dba807c2623ec745d7675312574e923919b7ef82d56b
SHA51234b78a531e1d664d654052018477916586ca976900403cd92bd766f373d4112419fb1dc0478dd39d841af5fb17dc4a40b7e9074b9c8cbac2dc86351a1b35ef5d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389