Analysis
-
max time kernel
148s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
3603f23de47f57a4f9b8b744cc88854a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3603f23de47f57a4f9b8b744cc88854a_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3603f23de47f57a4f9b8b744cc88854a_JaffaCakes118.html
-
Size
44KB
-
MD5
3603f23de47f57a4f9b8b744cc88854a
-
SHA1
89bfa8ab9b0f7ce8257a34e803b802ce2e2f31ac
-
SHA256
96206164ce1d70c7a99f6302a512a05b08b5b9ed1281b7ae6944d4b7322fdfd1
-
SHA512
58e98bfa8786cc8bd0062cff16736f9ef55c3790039a22612025a8f4c1d00ede5dece4cd7499c42ca3f710d4fa05f1a8d597b4b32da29a1412573d827c6d9b92
-
SSDEEP
768:XNkx29bR8aS6DGdcihPEP88LL6HnFKSFRnP7:MwRGHRFFP7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 4516 msedge.exe 4516 msedge.exe 2680 identity_helper.exe 2680 identity_helper.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe 4516 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4516 wrote to memory of 4620 4516 msedge.exe 82 PID 4516 wrote to memory of 4620 4516 msedge.exe 82 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2860 4516 msedge.exe 85 PID 4516 wrote to memory of 2848 4516 msedge.exe 86 PID 4516 wrote to memory of 2848 4516 msedge.exe 86 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87 PID 4516 wrote to memory of 412 4516 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3603f23de47f57a4f9b8b744cc88854a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb2f846f8,0x7fffb2f84708,0x7fffb2f847182⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2412 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:2768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10985442258344969017,5080435234636164980,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
6KB
MD559259fbb8f1731c531dabf31ffdf5908
SHA17a19e770d9cba828e7aba5c615a44a32d94a6349
SHA25691103162a5fb96d74da681f9bfa5ca691b9ae5610558ca6dfcad9a2b4aa37610
SHA512b6d92258937b5f0f3df1fce302e4ed887fb6c0d3f78e7f84b122248b8b811a15dd61861a159407b86a964d2310ec40706625e68e0c9aa79c1a42151750635faa
-
Filesize
6KB
MD51a229cbfecd946d0445ada099c425523
SHA1ae13b6b5214f52eb59759f0f8b5b7d698a42855b
SHA2561b0f7214cd1373fa042d6f4e50d868db711d04eaea29ff4801e2c2e373ebecb7
SHA5120e656b4c59440bf7959f7663988a322398d28e27580698aafcb1be6bd674dd410e5a1f757a1dfa9cccb7f00ef5fb3b212c86c9163b9fc889bf96afd9c20a27c5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a1daa62003c70c1abecd270c74e47750
SHA18b0e7cd4dbaf71a740a649085217c4d769fca186
SHA2565b962c33658e2883ba03d741eccddaf4de1a186e059c65023e0c286f61c592d9
SHA512c8a927b99efd7193b04a8f763a16f8384e3beb2191740d89ee1d34f28abbd72612249e8c0788748c00a39ebf58ebc9273a145592aabd9e25b6b746c16a932238