Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
32ea70ba1778f836efd3798add165e02_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
32ea70ba1778f836efd3798add165e02_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
32ea70ba1778f836efd3798add165e02_JaffaCakes118.html
-
Size
57KB
-
MD5
32ea70ba1778f836efd3798add165e02
-
SHA1
8f7d74c5dc3dab14e9b9a3938ffdbc1760538944
-
SHA256
17fe224c8df7f2a17efef8c96e2f92c08d5099b7b21c18f1a184d682d42bdec2
-
SHA512
af2d159130abf9babfcc56e16172143022b14a0c671ed1752b1c5b2f45bde5bb87807634020f8a47a4f71c82fe4c79fde3ecbd625de87297d032ee71b3f24d01
-
SSDEEP
1536:ijEQvK8OPHdsA5zo2vgyHJv0owbd6zKD6CDK2RVrod/wpDK2RVy:ijnOPHdsoc2vgyHJutDK2RVrod/wpDKn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4688 msedge.exe 4688 msedge.exe 4516 msedge.exe 4516 msedge.exe 416 identity_helper.exe 416 identity_helper.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe 764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4516 wrote to memory of 5092 4516 msedge.exe 81 PID 4516 wrote to memory of 5092 4516 msedge.exe 81 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 1644 4516 msedge.exe 82 PID 4516 wrote to memory of 4688 4516 msedge.exe 83 PID 4516 wrote to memory of 4688 4516 msedge.exe 83 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84 PID 4516 wrote to memory of 4932 4516 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\32ea70ba1778f836efd3798add165e02_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb873746f8,0x7ffb87374708,0x7ffb873747182⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2444 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5004 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6344 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6324 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,8704771222747004252,6342759327743003749,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
792B
MD541d86467577bac074f674be52ef43e0d
SHA1d06388cd6675af352cd861cf876c7205969cc318
SHA256d267e65b56b8d27a5802cc0ca2f916387d68e6e4777d93708f98074d1ea9feb9
SHA5122fb45d101b748534dd36017cab4fb2bced9f9f6487f749407d0eea726ac4bd0c2253fb8024c2d7bba5bd44c5ad76a7f7042e5266870fac01fd6a4c689b42bb8d
-
Filesize
1KB
MD515fff75413e0c9d7442f6dd70df56140
SHA1b32bbe1cd7a31fc56440ed45c519a19cb88fc135
SHA256bd8c318a050929c4a4f82575a0b472f1f847d172967d7a4850b30e876ca6e04b
SHA51275e942462c1342879b0604a955502b8d7fe40638977da84b31c806f3d9bd5e45cb6186956e03ea209a634c78e350a217549fcc874f36fff2641c559e773721c7
-
Filesize
6KB
MD54c2c1d5c8de936a959ddd20f92a26d7c
SHA163209e13c73cabce1e7be2c8c47de9077cedede0
SHA256ea60edf40a2cfda39a0c520ef7a54cf07dfb03c31298f0f2dd3af0e78a089de8
SHA51229625b499f95b3c8d1862bf4821e004b09f5ae933c52f097d9180ce3de89bfc76399b7b834c62d87f3c50286c0e69b6b2a02cfa8e55d4a2afb64193063701cac
-
Filesize
6KB
MD5c88b9512fb7f20f58e43757691161a76
SHA1526768be3f2459f52e3e112fabffc435a6afaf0b
SHA2569bb0d854385eb4b7b4bd613fc2d31d5fd782af3a9683e3c1a49402bc6bc0bb71
SHA512f4cb037e4a57aa0f2c4dd582b8eda03e89c17ffa3952e944ca5b7ad2c5b7ad9949c33eeb1ad141ac7f509e13c31af4bca38030d14af4e9b2ffc710f464c7867f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52acd700c1c0b2492e889bee839b2f4d0
SHA1e34ff3db83765acb37a5d0e04e31c18056e43788
SHA2561b31cc54e8529688c551212878e8fdb7e44afd78620d396206955543a3f68792
SHA512903d92afe46b7288fa03515e73652f89e8402b89f7ac9d02cfa0a08a9d8ced161d2a16533c65d54ac327568b73e8d4756400fdf2ec2af80c15334bf0be1d0995