Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 22:39
Static task
static1
Behavioral task
behavioral1
Sample
b11ffe3142c5aaeea9b7c2e148e7fe9d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b11ffe3142c5aaeea9b7c2e148e7fe9d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b11ffe3142c5aaeea9b7c2e148e7fe9d_JaffaCakes118.html
-
Size
37KB
-
MD5
b11ffe3142c5aaeea9b7c2e148e7fe9d
-
SHA1
27cb6519217add76a1296d9717636764f89ed0a7
-
SHA256
383d4a464ce798a525c14aece569253f5b2b3c9674a39a04e9575160fedbd426
-
SHA512
ab1499f67713a1a865df1e6dddd69a1f2f16fbd50b9f3287f2d3d584b365d2f1ca7f97cffeb4be8999ce3985692ace2665ebc137d4cc29a252f9f975a3f70af8
-
SSDEEP
384:SIFJ892cdmsCyp4AA5+DTTip2yeHip2SXr9+isU8c:StJvDT96Ngc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 4312 msedge.exe 4312 msedge.exe 444 identity_helper.exe 444 identity_helper.exe 5588 msedge.exe 5588 msedge.exe 5588 msedge.exe 5588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4312 wrote to memory of 1684 4312 msedge.exe 84 PID 4312 wrote to memory of 1684 4312 msedge.exe 84 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1448 4312 msedge.exe 85 PID 4312 wrote to memory of 1612 4312 msedge.exe 86 PID 4312 wrote to memory of 1612 4312 msedge.exe 86 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87 PID 4312 wrote to memory of 1500 4312 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b11ffe3142c5aaeea9b7c2e148e7fe9d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9099546f8,0x7ff909954708,0x7ff9099547182⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2004 /prefetch:22⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2340 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 /prefetch:82⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2052 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4376 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5908 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,5472961951013570016,1896988437796979766,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1944 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4156
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d18f79790bd369cd4e40987ee28ebbe8
SHA101d68c57e72a6c7e512c56e9d45eb57cf439e6ba
SHA256c286da52a17e50b6ae4126e15ecb9ff580939c51bf51ae1dda8cec3de503d48b
SHA51282376b4550c0de80d3bf0bb4fd742a2f7b48eb1eae0796e0e822cb9b1c6044a0062163de56c8afa71364a298a39c2627325c5c69e310ca94e1f1346e429ff6ab
-
Filesize
152B
MD59eb20214ae533fa98dfbfdc8128e6393
SHA1c6b5b44c9f4fff2662968c050af58957d4649b61
SHA256b2be14a1372115d7f53c2e179b50655e0d0b06b447a9d084b13629df7eec24ab
SHA51258648305f6a38f477d98fcc1e525b82fc0d08fb1ab7f871d20bd2977650fa7dafa3a50d9f32e07d61bd462c294e7b651dc82b6a333752ca81682329a389ae8c6
-
Filesize
5KB
MD5a916db5522f46ba6884bc357ec1b0884
SHA1e18eb1708b9d428bb6f736a0249000ef60d8f7be
SHA256f079b197a43dbef3fef9456e47301b19aec41a6d6d0e0bc77fe9aba2f95d7dea
SHA512fbeb4fff502100a07ca5d3fcad8a526e7f1dd094b3d4ae0a0988086047d0008d9c1ac3896ae97e01c947e5aa92ac8ce53b22119bdc9e909efcd302980500f8fc
-
Filesize
5KB
MD5922ac579885d97037ffa988cd242f361
SHA1680f821514a564601b31a0e86d7655fb2adddd68
SHA25623db332943b9de9dae4a76c57ed51f5db3856a79930d541664ffac2577e7b6e6
SHA51229ab9e9cc9a13f567872cd6fbc3f09bdafb70ba33740a34d7169e7868b86237dd0c397e27e772ae3ede95c248baf40905b687f07c338db482ca109f8d8fb7031
-
Filesize
24KB
MD56be217d826ff7c4aa81d39663a38dc10
SHA1b32f46cf12fc4821f702880382f18ef3714eec66
SHA256754dca9404f119306b757d135efbab8856521366fe9a3961c5373dda2a57becd
SHA512306a06b11f079ad10db885200c0bbe37b56bd9687024e18fa84cfb95663f8fb00debebb381e030d5e6c4daca8eddcf180a37668745ec4972ef732dcb0bd4296d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ffddcbf9948340d369de459caf578127
SHA12a1da5a31a81465f9e0d3ba999d69939c1cb94cb
SHA2561a2ff0b8cd385e9538c4d9a0f378b9772e150b04a68d5bfd6b1a0dfae12230d9
SHA512a4489923e535fd55b2b3127daf302177e9462bb630444a4e21d02f708119d838746ff1330f7fcf461f6c43057c7816c960b3d303da40e84f74c3b3c272730f58