Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 19:42
Static task
static1
Behavioral task
behavioral1
Sample
361deb7fe8b9fb913ec0fa4940a5dc74_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
361deb7fe8b9fb913ec0fa4940a5dc74_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
361deb7fe8b9fb913ec0fa4940a5dc74_JaffaCakes118.html
-
Size
9KB
-
MD5
361deb7fe8b9fb913ec0fa4940a5dc74
-
SHA1
ef6f9c190f4cd8440beec55d413fe8f1b9583c74
-
SHA256
48883e58c7f83b39e95a052674cdb0feeb8c44418b8cfb9255e53e033a2e8baa
-
SHA512
841410c2c003dbd51e82b93461c22812999dff57fe011b856f60216dde1c395a18a29f3f4c5a2949d1d4e7b2bc66f0247254c7cf3e6ae09fc235c89fbf00acae
-
SSDEEP
96:uzVs+ux7w0LLY1k9o84d12ef7CSTU3GT/kd6pNQlVHcEZ7ru7f:csz7w0AYS/GONQPHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2632 msedge.exe 2632 msedge.exe 3540 msedge.exe 3540 msedge.exe 4788 identity_helper.exe 4788 identity_helper.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe 3540 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3540 wrote to memory of 3132 3540 msedge.exe 83 PID 3540 wrote to memory of 3132 3540 msedge.exe 83 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 336 3540 msedge.exe 85 PID 3540 wrote to memory of 2632 3540 msedge.exe 86 PID 3540 wrote to memory of 2632 3540 msedge.exe 86 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87 PID 3540 wrote to memory of 4412 3540 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\361deb7fe8b9fb913ec0fa4940a5dc74_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe0d6b46f8,0x7ffe0d6b4708,0x7ffe0d6b47182⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3728 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,14054371074693392707,2953598718629882595,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:516
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
6KB
MD563a00361383f29daab7798e208a4a6ee
SHA1d2f8da8dc7f86261711113be097a845eda054766
SHA2563a03519eb1175d8a75876b8bd857449730323716bb4b6c21dff922e09821a483
SHA512ce632b1713b25021dd49887c927af2cef61d5721c30c81565f16b5efd70ccc1caadc8f9cabb3fa2d26cb552af4fa3bbbd62e91fa0c844c70f2893b7a1afb032e
-
Filesize
6KB
MD5b2cf2822b80bc2aaebc8689868428c8a
SHA1e05a3bc7d12205e8bd068afef8c4a40d7a2f7f9c
SHA256546acadb028d90f3fe3e44b4ce42f79259db19764a9d6192e446008bc3e27744
SHA512b01ac624bb4fe7a26ea1938fea75eca10e83154feab59f455b0648d5d6ed0af48439654d858aa752329550dbe1ab4dee72d0f9cdebace2fe42fb2e1f55bf4249
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD55f5531b6dfaaa9d4ec88c2231d384b6a
SHA1f1b30127d9d986cb862965be8428ddac1332a80d
SHA2560a14afe78cd361f8f3639e2fa1c5246313b17f47666d113750446a149ac3ad1f
SHA5129e8a6565e6a8748c82c23d2ec04a7e301ad1d4bf77465c6fde4c3124eac84c9e10730bf8fc7a5b13141915f64a917cbfb2802feb6fde5855806916bfd61c5008