Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
37a0ff9ccca0ad2b62ceefaee7897a3f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
37a0ff9ccca0ad2b62ceefaee7897a3f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
37a0ff9ccca0ad2b62ceefaee7897a3f_JaffaCakes118.html
-
Size
25KB
-
MD5
37a0ff9ccca0ad2b62ceefaee7897a3f
-
SHA1
d4b4fdd28814be457e5835101d957d743df622ff
-
SHA256
93fe6f7e2ff4bf6c6187e1203b41b13d288ce7fa5e57c7e5564e4386b4b6a7f5
-
SHA512
0cf1c4e909d1e9ffde981ee5d1a38e122e98b87b3c7f8ecf73d5863203149a00a0138b9cda5051b466a0ae2334f26f3f991159420e287f5845e8383e161172b9
-
SSDEEP
384:SIx1zLTucc5sPoagdXb/ewR/cSNrfrD7S1GHkkD4HTz:SmLTucc5sPoagdXb2w/fnoGHk1HX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2532 msedge.exe 2532 msedge.exe 3888 msedge.exe 3888 msedge.exe 216 identity_helper.exe 216 identity_helper.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe 3984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 2356 3888 msedge.exe 84 PID 3888 wrote to memory of 2356 3888 msedge.exe 84 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 116 3888 msedge.exe 85 PID 3888 wrote to memory of 2532 3888 msedge.exe 86 PID 3888 wrote to memory of 2532 3888 msedge.exe 86 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87 PID 3888 wrote to memory of 4712 3888 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\37a0ff9ccca0ad2b62ceefaee7897a3f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8c47d46f8,0x7ff8c47d4708,0x7ff8c47d47182⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,16954652736601946356,17412812740557123167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,16954652736601946356,17412812740557123167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,16954652736601946356,17412812740557123167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16954652736601946356,17412812740557123167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16954652736601946356,17412812740557123167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16954652736601946356,17412812740557123167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,16954652736601946356,17412812740557123167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5444 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16954652736601946356,17412812740557123167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16954652736601946356,17412812740557123167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16954652736601946356,17412812740557123167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,16954652736601946356,17412812740557123167,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,16954652736601946356,17412812740557123167,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
779B
MD5c13f8f03cfe6755c4e0395a75bfacf87
SHA1880de4d2b1568514b2bfbd93d1d2fee18f00734c
SHA25671bc8b5aa1a8fd70cbaf3817379618ddbbe28f9b653f627f8f02f138c30d1c74
SHA5121f6f4e84e8aa15d5417dcd805bf498911d64a6bd521f137e51cc7f1a4784a2c8d0e0d7e8c516d0ec3c7d5946a1b38b7b17f374bd73f653485f0a80a7b332cc4e
-
Filesize
6KB
MD5267e57a955b741cd914837cb5f48f3a3
SHA11ef981e79ceb64517f9a5387e15853881cb8c43d
SHA25667d561ae6eb0847157eed62d9564ecc116e846af2586450105d88f2903ad201d
SHA51290cc011a6b76e7932a161249dab08d504d2db0c5f8c5fe25d96393e0cdd3c498385935a5c8968ad371e1cef0b574b0bf3b3d03cdf693febe62fb1d33e0006bfb
-
Filesize
6KB
MD5dc0676633c8dc3737ab2c136f1ea453d
SHA110a004339acaeedca3b92055951c2b31658aa932
SHA256b33dee43a716e3d2f240befd423df6f5c15340936d1a7def112d699f0823fcf4
SHA5127abdc8225dd018cd133e5c226c378ed7d181070dab22474c60cb1274745511f2ad29e988129a4b831c84ad8c013756626d01ece3b986a9d0c96cef5a3d46df9d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e485d10938d7db288e120189954d535f
SHA171f7f8ae774683bba1796fd200d39b8c67a227eb
SHA256fe2803f1037dd0ce25543972e6f278b85e0e4b1d89be261d11b0f2682ddca0ca
SHA512777ed1c49c20daf16dcc035ff1543d1dc4ac7652f55194c9c99a412cbf84b1b91e5f8d9d67fe21bcae4501282a17f3995e02a673855e5000600f606e636aec53