Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 20:07
Static task
static1
Behavioral task
behavioral1
Sample
3630af810f2a3a9e6b64f77b0e0dfad9_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3630af810f2a3a9e6b64f77b0e0dfad9_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
3630af810f2a3a9e6b64f77b0e0dfad9_JaffaCakes118.html
-
Size
11KB
-
MD5
3630af810f2a3a9e6b64f77b0e0dfad9
-
SHA1
f2bdd2e5eb712d3f8b9b65a3768508bb96971a2e
-
SHA256
7d78f223f0c7efa9a78a862a4ccdb5063918897204a9a9d6c41d54c8ea42e0c3
-
SHA512
5578085e228d7a3b080d6a7f9047a67c5aa16d6c5ed72b3debc062430bf5f9a1ea885bb615e2b02a3bb92e60806c64d453df5f83719fc8f55078712692f6b656
-
SSDEEP
96:xCQ4FevWjDCFvB3YeIW3Blfn5x9bC7N1EX6/SxHtH5HPw7MNmvs9xPA0jYvIzVx2:94+Wv8P3RFn5RqlNQHzVkNS4+S/DW5e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3800 msedge.exe 3800 msedge.exe 928 msedge.exe 928 msedge.exe 1236 identity_helper.exe 1236 identity_helper.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe 928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 928 wrote to memory of 1124 928 msedge.exe 83 PID 928 wrote to memory of 1124 928 msedge.exe 83 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 4008 928 msedge.exe 84 PID 928 wrote to memory of 3800 928 msedge.exe 85 PID 928 wrote to memory of 3800 928 msedge.exe 85 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86 PID 928 wrote to memory of 1716 928 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3630af810f2a3a9e6b64f77b0e0dfad9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8af0e46f8,0x7ff8af0e4708,0x7ff8af0e47182⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4332 /prefetch:12⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:12⤵PID:1676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,2547258242171382399,8529938855677697201,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4356
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
6KB
MD578e89e3e2d4756474f603501ae7724e9
SHA1cb5c45215243e7db6ff0682117e4e95960288fc9
SHA256feb40d9890a3ddfdb38357263c0bc7c6e33c2a097cb69587f33f0e56d0427446
SHA51211279aff71545881b0e1fe163ddb836490d4198620e1694bb29e4bfbe9444fbdd8b4448383c9438ba272a0e12324784280118b30888d3bb664475ee1b0fb162a
-
Filesize
6KB
MD596649253681152d36fbc06461f96cf9a
SHA11acf1968ca7bb8ce6aa912bc7638ceca5852a5e6
SHA2562aa51466e813c1a2f464de261aa7c06c2b43ecf6b7feb8a13fa20ab21426f99a
SHA5122b6833b5a0241af3a085ad3cece67d58fe193adf714b14ac01fe5c1303d8a22483fefc6c58200fbc85fa9005bcc2458cba0a89a265c3d719970104d68e91d5ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD54028290f62cd4233daca19e02d1a1317
SHA1045285ec45a84c2eaea918773780be91530e29e0
SHA256645f0660cd65e9dcb5ba0d529f9cc306b4fd04a4b4b825f375bfed216dd68371
SHA5124ffbe8bb11dca78d982e3f962106a003f15a338e71818c12398b29395b482f3809bca473c2b93759d4e5441951727e2649cd323fd79ecc25455a1d0bb9cec199