Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 01:28
Static task
static1
Behavioral task
behavioral1
Sample
32c8b614ee46b2123935a04758d63614_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32c8b614ee46b2123935a04758d63614_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32c8b614ee46b2123935a04758d63614_JaffaCakes118.html
-
Size
13KB
-
MD5
32c8b614ee46b2123935a04758d63614
-
SHA1
f9430f9973b795302adf52545a12e92ee017315c
-
SHA256
cd120e6eb112013a9335257903ab478e6ffb46f6f083395c8b4e61506f0fe161
-
SHA512
222707f822445417564b6c4788cd71d35be6a2f937094139f35f418b9dbea5e22fb489207649c74284bcd755f30938280a673b5af8f5f85db702e07ccfd1d47b
-
SSDEEP
192:8dJP7YjJNX3P7J47IUdgHzpMFHL+akJ8mPMn+lL/Yb:MJP0jJFP7W7IUdmiRmPMn+50
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3480 msedge.exe 3480 msedge.exe 2104 msedge.exe 2104 msedge.exe 3204 identity_helper.exe 3204 identity_helper.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe 4012 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe 2104 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2448 2104 msedge.exe 81 PID 2104 wrote to memory of 2448 2104 msedge.exe 81 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3860 2104 msedge.exe 83 PID 2104 wrote to memory of 3480 2104 msedge.exe 84 PID 2104 wrote to memory of 3480 2104 msedge.exe 84 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85 PID 2104 wrote to memory of 1628 2104 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32c8b614ee46b2123935a04758d63614_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8ddb46f8,0x7ffa8ddb4708,0x7ffa8ddb47182⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16575575283230584210,14911388328315856780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,16575575283230584210,14911388328315856780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,16575575283230584210,14911388328315856780,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16575575283230584210,14911388328315856780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16575575283230584210,14911388328315856780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16575575283230584210,14911388328315856780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16575575283230584210,14911388328315856780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16575575283230584210,14911388328315856780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16575575283230584210,14911388328315856780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16575575283230584210,14911388328315856780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3776 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16575575283230584210,14911388328315856780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16575575283230584210,14911388328315856780,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
329B
MD59bb4c72569423b303a64b75476a87fbf
SHA105d0b658431684d094997a9c3e6090fbe8d5ca47
SHA256ca0ac74e6fe13f942c4632746a148b2b3fb86cbda767a9f96a61b00e5dc72c11
SHA512c9ab53fffac2b7bf38222625f533fb4a5361af67acdace142f1ac8b6d0deb20edbba4d7f149f2c7ae69d93ce746a5c36620bdc244f3ee9f68050da3bd663b298
-
Filesize
6KB
MD556433f56b3016c314f2c2df99acaf031
SHA1eb5bea971f545180e5c9f793464a7b288e8aa657
SHA256c1dc409e065345fdf9af473a67025a59a8972caf7dc283a3319872274d61f3c8
SHA512dc2e3ae04f0aa2e57b77d0b1f99bd7b9f52bc8275c3d54ec62f012028882d06e4648d4754e6367cde8b57673e4d6c8a7b759d75a96df9dfde1c83cb3f284e5f4
-
Filesize
6KB
MD5c0ddfdb160a27bddcd48025ffd015771
SHA1b77795b83aba6d76469be477fde90c6362d576a1
SHA256e4a50e85a22620c0270360e721b1f478eebaad041dd6e630fdb3802060540fa6
SHA5125ab0e3fe8a4db81c8260ba1ae035e0051eb9b4c24c04b298ee494c1f3a2139bfe7338b2c98aafe7e42c61efd236c8c03dfccfd1fe7b621e7416c4856d71fda52
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ebb93b44eef23294e71cb398b9123691
SHA18b103c4322d55d441653eec306a72f90d252e59e
SHA256c9643a632a2cd958cbd2666e68f530127415d22ed3e59c56cd8bbbd893e54f6b
SHA5128295ee9da546ae89206dbaed600985919aa31e8346ee51cc6b1fa96bbe6e3df673e0ecf673df35ecbc5ecfaca44ecec4652d8f8d03232954f4c6abd62866652f