Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 17:59
Static task
static1
Behavioral task
behavioral1
Sample
42bfc8e036b9b3b749e7a9a075c794ba_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
42bfc8e036b9b3b749e7a9a075c794ba_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
42bfc8e036b9b3b749e7a9a075c794ba_JaffaCakes118.html
-
Size
1KB
-
MD5
42bfc8e036b9b3b749e7a9a075c794ba
-
SHA1
ec0e7e19a8b543ac9297588d2993917dd670c244
-
SHA256
0af70e7fd44a8c205083b7511627db486a91df0d01a2862ee0601531cea867a5
-
SHA512
e56e4c9e3233ff5120a3e6107dc65c42c1863d93b9ccfc8d50261c98d9bffde737fd66c9eaa8a0303e73e9f4e8d8b2cdfb5501b10ee6fd1038a49f151130bed3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 312 msedge.exe 312 msedge.exe 4816 msedge.exe 4816 msedge.exe 3476 identity_helper.exe 3476 identity_helper.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe 3900 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 4240 4816 msedge.exe 84 PID 4816 wrote to memory of 4240 4816 msedge.exe 84 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 4680 4816 msedge.exe 85 PID 4816 wrote to memory of 312 4816 msedge.exe 86 PID 4816 wrote to memory of 312 4816 msedge.exe 86 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87 PID 4816 wrote to memory of 3956 4816 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\42bfc8e036b9b3b749e7a9a075c794ba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe4da246f8,0x7ffe4da24708,0x7ffe4da247182⤵PID:4240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4584 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:4388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1896 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4220095693893547556,10797983321980659459,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3900
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
6KB
MD554f687b9fc83b6ac9b8289e1caef44d7
SHA1c1dca848daffc6664dd4c28f38ce34c87c4204ab
SHA256cd95f6092dd298270e18a55440b1a7a8934f0bf49387af294e6be2f0c23c3ad9
SHA512b703f28303b6f440c00a7e824128953ee37f6f4c1bc8787ff1e48a85ddfe8f8511d9cff1f3c0b0d7d12e91d74bacfc6a0e35bc24820da5dbf19de52510a5677c
-
Filesize
6KB
MD5b8a112c4b19608c0411f849f7ab2ce12
SHA1302779d4cce4461462afec6b7892ed93d4b55971
SHA256b72d377fe338c711e75041007e9ee24246bae1d08b084b469f238a7627844a47
SHA5122bc3d686d9f69c7ba1b94b7cf0d545afe15b4e6e277bdc7535e22a3836d9d62cc465c78ddef3966264708b3374ee3a5ba9b7ab8813efa55903df9efe194bd99b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5c61c8c99404a866644f1f2e5ab4df20d
SHA14075159c29f2ce62c10251b522cf66a3880705ce
SHA256179b3d22f5d4380b33df68c8962407fe06cbd5d379dd1e80f61cf99db9b2c6a7
SHA512e0b5afcb71441d612bc6308fdc1d283cfc21d48522b18335887c297591b4bcae2b495511aed141584c87f5d619636911dddccf3de953ee58bdd780ad391a5385