Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04-07-2024 06:19
Static task
static1
Behavioral task
behavioral1
Sample
24eb52ed87b4011e1827a0730ba8e727_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
24eb52ed87b4011e1827a0730ba8e727_JaffaCakes118.html
Resource
win10v2004-20240611-en
General
-
Target
24eb52ed87b4011e1827a0730ba8e727_JaffaCakes118.html
-
Size
35KB
-
MD5
24eb52ed87b4011e1827a0730ba8e727
-
SHA1
a0fa9bc66bf5438c82f482148cdd37a947ec7787
-
SHA256
d03dd67777c429d96b7af207428b2bb47f30cb39ea4c465c15bbc23a4bbd9aa2
-
SHA512
a9e34780d3b7ac7272bbaa517390ff2a1b69cd373ca1987824ed5fae7002dd8db35e478911395fe32d6a75238f98125bdc1eb349357e670e52c7e62a9825c77d
-
SSDEEP
384:tqSYTKKUkNYew/l+TwIAROLNuyPqYjnxibxiE:tfc+keew/l+JAROLNuyPqYj0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 5004 msedge.exe 5004 msedge.exe 4536 identity_helper.exe 4536 identity_helper.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe 5032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe 5004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5004 wrote to memory of 4300 5004 msedge.exe 87 PID 5004 wrote to memory of 4300 5004 msedge.exe 87 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 4028 5004 msedge.exe 88 PID 5004 wrote to memory of 2052 5004 msedge.exe 89 PID 5004 wrote to memory of 2052 5004 msedge.exe 89 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90 PID 5004 wrote to memory of 4556 5004 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\24eb52ed87b4011e1827a0730ba8e727_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82b7446f8,0x7ff82b744708,0x7ff82b7447182⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4264 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,2265503871609413709,10010390901285830969,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1732 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c5abc082d9d9307e797b7e89a2f755f4
SHA154c442690a8727f1d3453b6452198d3ec4ec13df
SHA256a055d69c6aba59e97e632d118b7960a5fdfbe35cfdfaa0de14f194fc6f874716
SHA512ad765cddbf89472988de5356db5e0ee254ca3475491c6034fba1897c373702ab7cfa4bd21662ab862eebb48a757c3eb86b1f8ed58629751f71863822a59cd26c
-
Filesize
152B
MD5b4a74bc775caf3de7fc9cde3c30ce482
SHA1c6ed3161390e5493f71182a6cb98d51c9063775d
SHA256dfad4e020a946f85523604816a0a9781091ee4669c870db2cabab027f8b6f280
SHA51255578e254444a645f455ea38480c9e02599ebf9522c32aca50ff37aad33976db30e663d35ebe31ff0ecafb4007362261716f756b3a0d67ac3937ca62ff10e25f
-
Filesize
184B
MD54649a1be72751613a3fecea1491b3757
SHA147730c5da613ccacfd42f2e0150b31496e31e179
SHA256c14a907d3f612f17c7954e24bc91156b82d49b5b4c134498f4d3374b6eea4926
SHA512aebe006905ceab7145a4b38b44adeed95a71d36a49332b34fffc0fecf502ccd13009493b8a25eb02ac848fd3ff60460a70032d38b3da8e29428c479e298ddfc5
-
Filesize
6KB
MD58a25809e971b5afb459000a73c0b2251
SHA1bd2343946cb2b05b10d1a5fd252bcbe53c678f24
SHA2568cda92adbbc8fe1bdaf1dc6a39f0f447eeefb944fbcd8d569b47433c4efb8e4c
SHA512df5ea8ffa2d44da4d894bd9dff71f6d2ed6d66670dae5b5db05a49328343d3094ae5058b29311b39e2ce09f5df1d22e75e63852080b94e61378f3582ff124980
-
Filesize
6KB
MD5105ee4306afc9eac12f3aedaf71e8175
SHA14a7a4ffd4eabbb9d361268c8c9a065b6b25ccaea
SHA256799dc5d1d0976e72bced04bd74e5d557803e93c35ad589be9907762e2ceeb108
SHA512ddbedeb40d367ad96f696752fed94b22b53156b65c3f21126ef6361170ade36acff82fba5bf4dbfab986d67a0600b985bcabb95282e567aeca274081d1e0fcd2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52ee33ffd20d5aa4ed6ffc59bdc8866c4
SHA1d0330b5f15b9d332ee1acea2c8d29651ffeac333
SHA2561d6a1fd50dc82849e7377721185b324c8b803404c22ec3de8617a8283e853094
SHA5128f4533307de82936aea2700763c3c4bf9d6e9d970ebb4a8dfeca9177f3de4c6dc5366f1fae2f89db56d6bce2c1b8c0654fd892b84bf06c3e492823cf39690f67