Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 17:30
Static task
static1
Behavioral task
behavioral1
Sample
abebc4c8f92899836a3f59a6752afbf6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
abebc4c8f92899836a3f59a6752afbf6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
abebc4c8f92899836a3f59a6752afbf6_JaffaCakes118.html
-
Size
23KB
-
MD5
abebc4c8f92899836a3f59a6752afbf6
-
SHA1
432026c41d11817f2718c1ef13f11612921c6eb6
-
SHA256
4690eb6e42f91dc29fc826b62a4421813f77a80fcd8e428f4b3a273cb41a0686
-
SHA512
d9247bf706692feb0cdce856d283ab5e6dd4fd80341c2695d508783498dc7263593070c22acf86f0aa83c1143069031d3091f0d8f94b70b9b7bc902843a96272
-
SSDEEP
384:SDRcX1pyyt7Pbjbfee8479Vup0lq3ez6U4EYDP8ZbF5XGXF6jq:SDRcX1pyyt7PnbfRv79Bnz6uYUGXF6jq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3292 msedge.exe 3292 msedge.exe 3656 msedge.exe 3656 msedge.exe 332 identity_helper.exe 332 identity_helper.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe 3656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3656 wrote to memory of 3396 3656 msedge.exe 84 PID 3656 wrote to memory of 3396 3656 msedge.exe 84 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 4064 3656 msedge.exe 85 PID 3656 wrote to memory of 3292 3656 msedge.exe 86 PID 3656 wrote to memory of 3292 3656 msedge.exe 86 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87 PID 3656 wrote to memory of 1508 3656 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\abebc4c8f92899836a3f59a6752afbf6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8996946f8,0x7ff899694708,0x7ff8996947182⤵PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,8168706413715949268,571113392057146629,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,8168706413715949268,571113392057146629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2460 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,8168706413715949268,571113392057146629,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8168706413715949268,571113392057146629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8168706413715949268,571113392057146629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,8168706413715949268,571113392057146629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,8168706413715949268,571113392057146629,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8168706413715949268,571113392057146629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8168706413715949268,571113392057146629,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8168706413715949268,571113392057146629,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,8168706413715949268,571113392057146629,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,8168706413715949268,571113392057146629,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
588B
MD50b3fcc12d04a6ccbd93abb25a1e0eadb
SHA10dd26a805f0c609cf816a9d50a3aa18a9dcddfa8
SHA256e7e42895b03f693e7ad73dfe12d1129bc5a39fbfa819c65d058a292319ac7617
SHA512d14643e11e3a9b53a87b0983d8b57b42256d55215c02eddc4c50c382990ff02e5f823e3ed7ac96222fe16f4dc43a51a2a61d5e275702da3d3cbd53e30816e144
-
Filesize
5KB
MD5e3eff13a076e15ff77342e5cb8a90a1d
SHA19805057f619b0e8589546081a231b9c3d0ba388a
SHA256e7a2cff8d6f4592e2fc0a8761e2c15b89872bb5b86abc578f2d1114323c1acfd
SHA5125247773b6b96caa9349469d4bfcc75afd7374fbc69058ee15da6d607a170d5a8ef1df548a2831df2c1cdc6d723f12cbbcea25f1aa09d9f6ccf6b74468a532a7c
-
Filesize
6KB
MD574a99f296c37ae5f59ff2c6ef1e2d985
SHA1b57ede9d8e813cebea5ca27037e2cee61f61d4ee
SHA256b478c3c481b8bcdf2fe4c04a34602bc62d933f6cadce53ef593cb981103a27aa
SHA51277cbcb245d6043def425b80d17bb3c70216838fdc090a7b43e2ea721420d49d0b762c6cac4d2d01c3b86d7a4537e337eadf0c3ba7453e32fdeb22a5277381b00
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5102a0aebfca545518b9a84f1208fed9f
SHA1da468c8159b8e11f90009493b6788482e5c6f367
SHA2563a039106d6f9e868b9e0cd8bb2ceb9404b0c034697169b2a9c8d0836f8481830
SHA5124f7bfa93d5ac58a08c0a487a1e23094685fa996348a9eb8dc625fc9e0d131581d82eb60a3a3ed9378cce1694777dca1570a48c3000200c118e3915cdf0026439