Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
08-05-2024 10:01
Static task
static1
Behavioral task
behavioral1
Sample
24547ef57f839e6f8bb9f0eb42b32eaf_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24547ef57f839e6f8bb9f0eb42b32eaf_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
24547ef57f839e6f8bb9f0eb42b32eaf_JaffaCakes118.html
-
Size
248KB
-
MD5
24547ef57f839e6f8bb9f0eb42b32eaf
-
SHA1
d708a703490a385feff99447140d58d702fd00f3
-
SHA256
46d691a930974a4ea85e8d5c709aa314a0aee0f6504d5ae7d38b80df9359e593
-
SHA512
61769b7977e569c9fdd185a07e9f705bf42148f72524c3169716f3a51f4a5383eef67933b623301c8f8b8c1733019e1932ed8c2585a973b34290422a9612ecb9
-
SSDEEP
3072:2Gb/TGV4XreTrbnVPfHLkDdKRvaH3LNz8c4AQ0s/O7Xku2m2:nDefTlLkDdUvaxb4T0+vm2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3848 msedge.exe 3848 msedge.exe 2784 msedge.exe 2784 msedge.exe 2796 identity_helper.exe 2796 identity_helper.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe 1928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2784 wrote to memory of 3812 2784 msedge.exe 84 PID 2784 wrote to memory of 3812 2784 msedge.exe 84 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 4712 2784 msedge.exe 85 PID 2784 wrote to memory of 3848 2784 msedge.exe 86 PID 2784 wrote to memory of 3848 2784 msedge.exe 86 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87 PID 2784 wrote to memory of 912 2784 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\24547ef57f839e6f8bb9f0eb42b32eaf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6f5046f8,0x7ffa6f504708,0x7ffa6f5047182⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,74378482570533593,10740204815462737444,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,74378482570533593,10740204815462737444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,74378482570533593,10740204815462737444,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,74378482570533593,10740204815462737444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,74378482570533593,10740204815462737444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,74378482570533593,10740204815462737444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,74378482570533593,10740204815462737444,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5392 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,74378482570533593,10740204815462737444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,74378482570533593,10740204815462737444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,74378482570533593,10740204815462737444,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4120 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,74378482570533593,10740204815462737444,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,74378482570533593,10740204815462737444,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5104 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD562c02dda2bf22d702a9b3a1c547c5f6a
SHA18f42966df96bd2e8c1f6b31b37c9a19beb6394d6
SHA256cb8a0964605551ed5a0668c08ab888044bbd845c9225ffee5a28e0b847ede62b
SHA512a7ce2c0946382188e1d8480cfb096b29bd0dcb260ccdc74167cc351160a1884d04d57a2517eb700b3eef30eaf4a01bfbf31858365b1e624d4b0960ffd0032fa9
-
Filesize
152B
MD5850f27f857369bf7fe83c613d2ec35cb
SHA17677a061c6fd2a030b44841bfb32da0abc1dbefb
SHA256a7db700e067222e55e323a9ffc71a92f59829e81021e2607cec0d2ec6faf602a
SHA5127b1efa002b7a1a23973bff0618fb4a82cd0c5193df55cd960c7516caa63509587fd8b36f3aea6db01ece368065865af6472365b820fadce720b64b561ab5f401
-
Filesize
5KB
MD573f35ad2a9ddd2df65cbd2c41a027b9e
SHA1a305cb12b5e4d8dbca9248951923ea4e16e6998f
SHA256d5e2ec46cec4c1d8df6f1f2960642f9f48c87a00a0421e3afc64bd4b444228bc
SHA512b589f06fe614b5c1682e66ccb527140737061aef51f75f5ebe68252692d4df6db50060c83022a937e93f897335f6364534020778202ed19d64362e248db5e515
-
Filesize
6KB
MD59eb45baa056aa5e41ae74693cbbd12ab
SHA175fb8b2a5c2f322abdc4eaa77b9ce18c73bb8fd6
SHA256ecb17a04ac3dae10bf7f03ac03de5194c039fb699a936f45c1da0d2d5f29cd0a
SHA5123b26820ed245fddc0d2b07c57ca45237881b80f9a9e8a13ba974f5d2e719504695f4217a0e9ba7e99e4b07910d7fa6a16d8af134b1be3cd9c9c9e668636878ff
-
Filesize
6KB
MD50199226df65f4d707d146974243ee3a5
SHA132f1fbf769dd9be7154fe90ff6e8c049ceb5aa46
SHA256360d2cb2988887bc958f300d6a3d1e4249b085e12d51bed1bd348cfb61af138b
SHA5121051e2e05943ad79360bc72ceae423de5ae144044bc602bb6689815119d63bc022fe2358259367fc30296ab6e5d5060c5e23078429b1ceec1223dcdd1628dd33
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD599113b4cb7086ad469f3a225d2b111a9
SHA10e5a90120a6f0de6469976ab894b22fb6a56d9d8
SHA2563756273c6ee09930528e2134b64aa7735803f7b37de4d21cf1f32b95442baf2f
SHA5127dc3fedd5a69ccd13ca6cfa6fe056514c758456d5d4285d5e1246876ff1ccdbf601433de2e5b61795b99728e52901adbfcd574bdd4a8f1f0f198dc5766c07961