Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
aafeeec680d0ed46b736aa5850ad9e5b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aafeeec680d0ed46b736aa5850ad9e5b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
aafeeec680d0ed46b736aa5850ad9e5b_JaffaCakes118.html
-
Size
120KB
-
MD5
aafeeec680d0ed46b736aa5850ad9e5b
-
SHA1
7a3e1638c407062fc98c141dfb4c59de5c21ab65
-
SHA256
5349843cfac2c4c6b500622c042885ed7f5c3d3f65db142f386a40330742d07c
-
SHA512
b49d2a644621f0a6f4352e79ffbf5e62ac287feed110d431d4e1a900054446cfa5b338471a55b1909f4e7f13064f7284a952d8f6c12a4d398d670fa0d149e5ac
-
SSDEEP
768:Tx+GxQRaVMaZvhZ/gVvuz0cxINXox287a+jwcipfdh4t7voryhwDqfJdF00N:TYiSS//YV9oINYx2wEtYvoryhwmxE0N
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4680 msedge.exe 4680 msedge.exe 1352 msedge.exe 1352 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe 2440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe 1352 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 3260 1352 msedge.exe 84 PID 1352 wrote to memory of 3260 1352 msedge.exe 84 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4824 1352 msedge.exe 85 PID 1352 wrote to memory of 4680 1352 msedge.exe 86 PID 1352 wrote to memory of 4680 1352 msedge.exe 86 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87 PID 1352 wrote to memory of 4596 1352 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\aafeeec680d0ed46b736aa5850ad9e5b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83a3746f8,0x7ff83a374708,0x7ff83a3747182⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,8552172594014785315,2087761205167826623,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1924,8552172594014785315,2087761205167826623,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1924,8552172594014785315,2087761205167826623,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,8552172594014785315,2087761205167826623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,8552172594014785315,2087761205167826623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,8552172594014785315,2087761205167826623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,8552172594014785315,2087761205167826623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1924,8552172594014785315,2087761205167826623,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1924,8552172594014785315,2087761205167826623,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:744
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5327302ff19bc56adf2f10adb519cdbe6
SHA1a490a5f7a175dcf757b2759e82f0aa84a862270e
SHA25695fbd5d0839d80f0261f0f37be6d448677c0981ae3acc24d3f506957fd8c5023
SHA51268808e7d3df732c4d5819e557e28a2e5fe6460063f123aa03a4b20cf541019f8bb87d2303a24c4564707f39935c3077f90577406a56061eeeb2d137acfb9f275
-
Filesize
6KB
MD56dd03182c7640b46779a13bceadf2f18
SHA13495009e288cd252ab8fd154fe55e508d2fd0f8d
SHA256072633c0626ca138e2f26f37fb0c9b1e9d8acc1261a2e133ef95e22967d81ff4
SHA5121694bcef06b6622e08e80a82fc9941bd0ce4190b27729c13a05f1de0ff70a7938a1bee069a2b4d735645379d5289211602e69f2577a4d35be5c99336087a4cee
-
Filesize
6KB
MD50b8d414336b3447fb896d6d7cc99dbec
SHA139237b013e2894df779c3d597c34b26278918999
SHA256a996451f3bdb621d72444f8a6106ed161759fcfa3d6bb48eea3e89db30839afb
SHA512a15ef0b1da3cb2500f59fb5d06f99976d312a02df155082a27384d8f6c57006c280f9f3f2128d51e8d525df7c479048555af80b4779160680bd38cfdabd6d56e
-
Filesize
10KB
MD5b8bf0b1a695e718fd41168f5d2641de7
SHA17c80e7066989c3cf0289dcb503d2c20716e4546d
SHA256add9e4d90dd7a2864928773154605780981bb307abe5c2a661d73875d2f800c0
SHA512102f5de9d3b83b204a451bc6e1495ad402ef338c2f1c6e52f1fe49f93c9a16c53f08f7cda10119f1ec700c195d57530f7dad02442d658460e2a5e57c1149002b