Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 13:29
Static task
static1
Behavioral task
behavioral1
Sample
41de8a6eb61d506e45a389f6a0f900ac_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
41de8a6eb61d506e45a389f6a0f900ac_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
41de8a6eb61d506e45a389f6a0f900ac_JaffaCakes118.html
-
Size
53KB
-
MD5
41de8a6eb61d506e45a389f6a0f900ac
-
SHA1
bf14caca8520e543b9fb4e66c0313f6b9af51668
-
SHA256
13e1d76f1569e4449a208287abbeb7855d44c8ef7273c7c6b5b017257383e0bd
-
SHA512
8afb2a3fbe159563a67afb142890e323be3d2a488ebb0474f49df5153639022fdc8dbc851c439c3b78f09314c19d0122483419c7988d322ee8572415730051f3
-
SSDEEP
1536:CkgUiIakTqGivi+PyUsrunlYV63Nj+q5VyvR0w2AzTICbbXoy/t9M/dNwIUEDmDb:CkgUiIakTqGivi+PyUsrunlYV63Nj+qO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1164 msedge.exe 1164 msedge.exe 8 msedge.exe 8 msedge.exe 3644 identity_helper.exe 3644 identity_helper.exe 244 msedge.exe 244 msedge.exe 244 msedge.exe 244 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe 8 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 8 wrote to memory of 1684 8 msedge.exe 84 PID 8 wrote to memory of 1684 8 msedge.exe 84 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1800 8 msedge.exe 85 PID 8 wrote to memory of 1164 8 msedge.exe 86 PID 8 wrote to memory of 1164 8 msedge.exe 86 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87 PID 8 wrote to memory of 2180 8 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\41de8a6eb61d506e45a389f6a0f900ac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcf3246f8,0x7ffbcf324708,0x7ffbcf3247182⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5868 /prefetch:12⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,11174730351954369222,16195452090506222736,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:244
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1344
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
403B
MD580d8e5ace2824f693aa4f9dfbdbd3429
SHA1050db2e9b02b0cdb32d13f6fbe6f025ff8dac62f
SHA256e32e55a97942120727518031aac09eb09ae088477fd9b46c2ce370f44413ac98
SHA512df7aee87540fff808d073fd2981237f9aa2590e4dad394457deaf2f3d6355f45fffb509bf32acacc2965a8bee6e81985e29bc925e50b2510530c0e3029a5c865
-
Filesize
6KB
MD5ce5203afec4bb7e03d56af372ae2e612
SHA1b2fa434f05c8016cfad15bb003a0af4878a8bb5d
SHA256e1d3d86a505e00447abaa007adc8093009a8a043eb305151ef5dc1b52b1cb00e
SHA5128819ff7add60e37518e9e2bafe3a04ea29e944751c5b2fba71f64d1a2874341e309bdce36b0172d5300caa7bcedbed6624f0877502baabc4e5b6b75313535a14
-
Filesize
6KB
MD5d11b705c3bbccd4315711059ad08cedf
SHA1745e9e906a90fe394e6e12b23a87ad034e2772ea
SHA256d46495017887bf129e5c31cc8bded950e96fb18e63c372261a9bb6e6120f39c8
SHA512f90c4f2c313b73489e35bba54b47a0c7766d124710af66e94a44b508d506421856f7dbbf6a790711756a3040261c55cf6542ea5de6fbc81d4b58613ac08e6d27
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD52bbb25c9762fb269ed40cc517278980f
SHA1c9855adea2d17813205c6b14b169724a2ad9f87c
SHA256e0e7e2c73ffc2f773bc061c300286aa5dc5742b90306e4c443eebe9648d7eb6c
SHA51275068e20a2697df61f4302cfb1b8eb7ef77c57a73be0235f38dab5dbb6051c7465bde26525c3713a93f4dc904748748dd31ea767d5b25047b50311e6f6545c9b