Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
33084138bf23393b337878e10fe71bf3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
33084138bf23393b337878e10fe71bf3_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
33084138bf23393b337878e10fe71bf3_JaffaCakes118.html
-
Size
120KB
-
MD5
33084138bf23393b337878e10fe71bf3
-
SHA1
2fcb0a93e78bde5808897e4b2cd07f936fb88db2
-
SHA256
4f40a72ee2fe8608efd42b597475beaab9ca14fadd178647188ff0000545d66d
-
SHA512
93921f50d299c94406f6aad54fd55f1b4a901ef8da5ffa865ced214bde8b82fe6810ffcd6ee1606ad5f514ef918f860e799f1b113ce95143c49cd2ff6f4f4d6f
-
SSDEEP
1536:Nv76dVaWVoTpFvlvl8h5GQem23Q4dCL9bbC:NeDaWVoPWYmKQvB2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 948 msedge.exe 948 msedge.exe 3312 msedge.exe 3312 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe 4588 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe 3312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3312 wrote to memory of 2276 3312 msedge.exe 81 PID 3312 wrote to memory of 2276 3312 msedge.exe 81 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 1196 3312 msedge.exe 83 PID 3312 wrote to memory of 948 3312 msedge.exe 84 PID 3312 wrote to memory of 948 3312 msedge.exe 84 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85 PID 3312 wrote to memory of 1768 3312 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\33084138bf23393b337878e10fe71bf3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff768946f8,0x7fff76894708,0x7fff768947182⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13604856422310894972,14716676674622556267,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,13604856422310894972,14716676674622556267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,13604856422310894972,14716676674622556267,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13604856422310894972,14716676674622556267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13604856422310894972,14716676674622556267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13604856422310894972,14716676674622556267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4988 /prefetch:12⤵PID:1304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13604856422310894972,14716676674622556267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,13604856422310894972,14716676674622556267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,13604856422310894972,14716676674622556267,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:688
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\8d7fdb4b-e072-4f4d-975d-a17e3715979d.tmp
Filesize6KB
MD53ca54886a5493a9203d2519e147293fe
SHA1fe8545deb4b3af82f9ed6e64a8d7aa9b580000d1
SHA2561b3744b68d3b0b3ed1bf9354683095669662240863c0a4b954fccb7e0cc1a234
SHA512c2f6ab464d045f21e8a10d6d41b99031e4b2922fb53d99c8a892778b4b05bb8f15fd19f5209429309153df8ff32298ceb9133b45666a10f79fb5939227f0baee
-
Filesize
6KB
MD510859ef07871f5fb2ea34ca2cfe46490
SHA1e87d7af8e66a48bdb2cd5fbc728b4c4488df5f20
SHA256ad0ad013fb5ffa867f6fa0f0a64b460ffdd52c8dc43122d77d68c151fd4771be
SHA5120f128686f822152604c581edd8ba52f1de2633e74b2946ba31d73ee8a0ae24f626884a923ca32880ca8ffa011e232cd27323bc7498fa895b28f0d96cd8b90f6b
-
Filesize
11KB
MD59a75b39c92df19e12629317f44d6e146
SHA1ed22a656ecad580e40de4ad19271c25320355abb
SHA2562f0235faf89fb667e342d2a066961c8a7dfce9f7695761ebeed2baa93025fb61
SHA512f5ab09e4cb8c302fc765f99546674a26d2800b72bb896b86250ace6f612c3877bc61d1bb3c3b35a6caff1a1b68327935400f9685c3b1d13f0d2a5382a01f18a4