Analysis
-
max time kernel
146s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 16:30
Static task
static1
Behavioral task
behavioral1
Sample
2d085ba4490513b47d99326d9e6767de_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2d085ba4490513b47d99326d9e6767de_JaffaCakes118.html
Resource
win10v2004-20240704-en
General
-
Target
2d085ba4490513b47d99326d9e6767de_JaffaCakes118.html
-
Size
1KB
-
MD5
2d085ba4490513b47d99326d9e6767de
-
SHA1
7ae5b98a69b005bbf4ac1762704d50907ade6d27
-
SHA256
fd421e02761974d55ee29b4e58303f11ba9e405d995c7a92ea069305f9f92977
-
SHA512
1d46987cd08dda15536abc898725d41aa48229fbc2db764d3adfd11dbee0a3e4f230e39148955d339f785cc0f4bdddd5cc77bc51800655325dae18c138ee067c
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4032 msedge.exe 4032 msedge.exe 3504 identity_helper.exe 3504 identity_helper.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe 2056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe 4032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4160 4032 msedge.exe 82 PID 4032 wrote to memory of 4160 4032 msedge.exe 82 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4412 4032 msedge.exe 84 PID 4032 wrote to memory of 4408 4032 msedge.exe 85 PID 4032 wrote to memory of 4408 4032 msedge.exe 85 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86 PID 4032 wrote to memory of 2848 4032 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2d085ba4490513b47d99326d9e6767de_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc280d46f8,0x7ffc280d4708,0x7ffc280d47182⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3148 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 /prefetch:82⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9767410407293070600,12705389795107908620,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1624
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f0f818d52a59eb6cf9c4dd2a1c844df9
SHA126afc4b28c0287274624690bd5bd4786cfe11d16
SHA25658c0beea55fecbeded2d2c593473149214df818be1e4e4a28c97171dc8179d61
SHA5127e8a1d3a6c8c9b0f1ac497e509e9edbe9e121df1df0147ce4421b8cf526ad238bd146868e177f9ce02e2d8f99cf7bb9ce7db4a582d487bbc921945211a977509
-
Filesize
152B
MD50331fa75ac7846bafcf885ea76d47447
SHA15a141ffda430e091153fefc4aa36317422ba28ae
SHA25664b4b2e791644fc04f164ecd13b8b9a3e62669896fb7907bf0a072bbeebaf74a
SHA512f8b960d38d73cf29ce17ea409ef6830cae99d7deafaf2ff59f8347120d81925ff16e38faaa0f7f4c39936472d05d1d131df2a8a383351f138c38afb21c1a60e2
-
Filesize
6KB
MD57e7e6fa3d851fa40b3cf7c878884f7a4
SHA151335249570562b0eb30c9bfb744f9622343f967
SHA25651c7eca356d202ef353407e77323565bf843875649154022ae2960a30fa8b428
SHA5122c0cadb353c6015277d39237947adf1ba77408453dc05100dd1d82cb1e02953f3afa8d17e31b4c1c8a1ed97cc6280ba2b6ebc44ce258f01fef8a09446e7f3e74
-
Filesize
6KB
MD55c30c816c4391b8acb56825af684ccbd
SHA16d74b5a8e6d9cd29604c3136d51be418639f90a0
SHA2560fea932ee751f8009f0ada618150a00bc3991f5e93955fba94f37302a4b4da8b
SHA51221aaf8ddc6c56ec2eb72e4f800bbeb47717350d94ed10303d6987c4f3ef9d46352cc1ad4c802424733b99476e2cecb0a3f207bc0a56904502088aadef92a8b29
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5b42a48ad2d30fa75e36f93d6c03a22d3
SHA1f2335c28b080d01d34c4ba4e044d527ddd8abd83
SHA2564f7c0526ed877116e28e354ff0df59d2fbbb0908bd1aba131b94c8559147919d
SHA512aa028cb125599153eb3e9e0cacde79e62b7545e19b281d150ed4251f942a7a4e7e9a37df66b54b1dcf7eaeabe48066824bd361cb1cf78e3ed115d077bfe3c4a5