Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 00:54
Static task
static1
Behavioral task
behavioral1
Sample
32aea3974ee7f689d4539490037d01e4_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32aea3974ee7f689d4539490037d01e4_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32aea3974ee7f689d4539490037d01e4_JaffaCakes118.html
-
Size
1KB
-
MD5
32aea3974ee7f689d4539490037d01e4
-
SHA1
d9b158ce6b183e3fdb8a392895f5252620ef1db3
-
SHA256
1011ea73fb0b7f0d006ef2f47a6ce08dd270d64ba7ecd72555e155993dfa56c0
-
SHA512
81b477949b7e84d6bbd23a264e9cebf5cca9e66d4ff5055c049bdc9b7e929c70fca30bfe1725c456cce0b81d06e43a5db53b242bb98c3ad51bae5b7984f674d4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 720 msedge.exe 720 msedge.exe 928 msedge.exe 928 msedge.exe 2632 identity_helper.exe 2632 identity_helper.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe 4868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 928 wrote to memory of 4120 928 msedge.exe 80 PID 928 wrote to memory of 4120 928 msedge.exe 80 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 2924 928 msedge.exe 82 PID 928 wrote to memory of 720 928 msedge.exe 83 PID 928 wrote to memory of 720 928 msedge.exe 83 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84 PID 928 wrote to memory of 904 928 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32aea3974ee7f689d4539490037d01e4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb98646f8,0x7ffcb9864708,0x7ffcb98647182⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5832 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17728216668306231952,16798116608833261968,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5488 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
6KB
MD5432f99dbccf2f226454455b8f7d8b72b
SHA16cda210766e084b096086d9293594f74de253af3
SHA2563bf93dfc0bc3c4c49bc6f2c14b0f0243561791f8427cbd546e4450cfe9b00684
SHA512b6658c063778787df7157427bdaec005d7102f51a8366bfc8c3eac1c120f50c6af205131dd2caa2503680eaed3c9c1fdf2565d09964958ffa3c16ca9aa1ea016
-
Filesize
6KB
MD5e2f5be4639f7e7fdcffb5f2f1c5c731f
SHA14de710d16b54a7bc8a3bdfcf71e4135b45fcfbd5
SHA256921a7562ea13ae373e346f03785b3192920ed5bd7be947068dd95646099c2f20
SHA51246d204f215da8c0139aa8494481c96f320cbbc01a32cc1e9bdf932ae0146f5249f782bb77bf0f9faf22aacc3eae705a52cf664a6c0a27f33d17cb9ad0ff33d7e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58bbf9861200d2a1894b528015cf3071c
SHA1309af08915830b61e79995bd10a9acb1498bd6c2
SHA256c0accf215ccb78ab24e028411ad649ff0984ef8c169b25bafb8a263f532239b8
SHA5128dbb08a0a88956896215de67c4bfea5fa09180097eeaa3908f7f909780007b14d45625f639a2d25a0f2f0a5d4f41a7ebeda31b2851f93e59c655b82cca274d01