Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
15dbd9138f5cf6e2e9b74e3a20b0a644_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
15dbd9138f5cf6e2e9b74e3a20b0a644_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
15dbd9138f5cf6e2e9b74e3a20b0a644_JaffaCakes118.html
-
Size
17KB
-
MD5
15dbd9138f5cf6e2e9b74e3a20b0a644
-
SHA1
005e43b95089a9bd20b2fd1a03e1d4705f398c0b
-
SHA256
295fa7596b5e8df41270aaa94824d5bf1f700df9409718c7a8712a20722a2242
-
SHA512
4f545e8ff218292387212bdd8962dad7dc7714fcd5b255cbc59ed9926b5b85e1444b3e4f227d10d1fd75d7339066df62e886e42721e75fd73d3ee9b695a839c1
-
SSDEEP
192:RnmhwGv2E7W2h+YoxZcxhHigFsZDtV6/jwWY+XMLBElYCB0IjTet7L0JzssV5ooW:REwGOE7th+YoMm6/jw1eM1Stos5W
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 3188 identity_helper.exe 3188 identity_helper.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe 380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 380 wrote to memory of 3116 380 msedge.exe 81 PID 380 wrote to memory of 3116 380 msedge.exe 81 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4240 380 msedge.exe 82 PID 380 wrote to memory of 4420 380 msedge.exe 83 PID 380 wrote to memory of 4420 380 msedge.exe 83 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84 PID 380 wrote to memory of 3016 380 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\15dbd9138f5cf6e2e9b74e3a20b0a644_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8f8da46f8,0x7ff8f8da4708,0x7ff8f8da47182⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1472 /prefetch:22⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:2548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1912,5503850358523851536,12063419843029687129,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2908
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556641592f6e69f5f5fb06f2319384490
SHA16a86be42e2c6d26b7830ad9f4e2627995fd91069
SHA25602d4984e590e947265474d592e64edde840fdca7eb881eebde3e220a1d883455
SHA512c75e689b2bbbe07ebf72baf75c56f19c39f45d5593cf47535eb722f95002b3ee418027047c0ee8d63800f499038db5e2c24aff9705d830c7b6eaa290d9adc868
-
Filesize
152B
MD5612a6c4247ef652299b376221c984213
SHA1d306f3b16bde39708aa862aee372345feb559750
SHA2569d8e24c91cff338e56b518a533cb2e49a2803356bbf6e04892fb168a7ce2844a
SHA51234a14d63abb1e3fe0f9927a94393043d458fe0624843e108d290266f554018e6379cba924cb5388735abdd6c5f1e2e318478a673f3f9b762815a758866d10973
-
Filesize
5KB
MD5855df7333d5bbbf5eb9866382c1ee6f3
SHA1e1a17d4e0ea29a00ac4f24ccc856cfa2d1dbfb29
SHA25639571dbda2a49f0f14911d5a1b1ee5cbecb7e0b67f5569d5f3fe75a6864c5505
SHA512124b54b5f921513d347fa6ff048312aa5d67afdd75a0f51885f1bf87cd52464afd78f3491eb4f02cc866de5ef6a6d8cd76e2462c75958444f4463d4c6f35628c
-
Filesize
6KB
MD585dd42dff6bdec675c551dd0f4a7779f
SHA1c349a0c99975679d05432a3e93e63e5419bc6335
SHA256e8869d8a0baa8ce9161e94a8f0b0def672de394c871eaeef50477c17794cb097
SHA512397e4ce04446384165f2efbd00d4ede8e85030b5bbcf90fd68016a7cf8cf36d1bb1ebd63917e94fdd8597893fd10b5ee802721f747732205a7110b7f06354784
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT~RFe5782bd.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD57565a7823f9496abd021c8fe5404e750
SHA1d3862d6e019e0601b1fb0a51dc9577f7bf5acaad
SHA256f05bf8cc7ad29e967ebb1905ce7b67270c0f0c878d3996c2e187f50b5c3f2fb9
SHA512cbf36a51cd5f2fa05f62c2e6960a95662a4806ffc32e1e289ca179e2cf340e2656b5637fe801f94e4acec6ece58670d629b3ac81708f7925194096987ee094b5