Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 05:43
Static task
static1
Behavioral task
behavioral1
Sample
448b5a595cdfab3c3cb5dccb43ba679b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
448b5a595cdfab3c3cb5dccb43ba679b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
448b5a595cdfab3c3cb5dccb43ba679b_JaffaCakes118.html
-
Size
6KB
-
MD5
448b5a595cdfab3c3cb5dccb43ba679b
-
SHA1
9703aa52a6e81f5a24792e7ddbc842ec95c39419
-
SHA256
c8e13dea428d9dda6523185a338649dba039c598d5cb36ba17ab111fb08af021
-
SHA512
de843ad299daa75437169f62e30603b8acc7d2b734144b781168b5f4011523b4e4341c4620aa4839bc6635592b456773503500db8255b96dfb9bc34800c86ab0
-
SSDEEP
96:uzVs+ux7MzLLY1k9o84d12ef7CSTU4IcEZ7ru7f:csz7MzAYS/6b76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 1032 msedge.exe 1032 msedge.exe 2208 identity_helper.exe 2208 identity_helper.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe 1032 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1032 wrote to memory of 1156 1032 msedge.exe 83 PID 1032 wrote to memory of 1156 1032 msedge.exe 83 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 4368 1032 msedge.exe 85 PID 1032 wrote to memory of 3436 1032 msedge.exe 86 PID 1032 wrote to memory of 3436 1032 msedge.exe 86 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87 PID 1032 wrote to memory of 1008 1032 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\448b5a595cdfab3c3cb5dccb43ba679b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b47846f8,0x7ff8b4784708,0x7ff8b47847182⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,14404826323937180454,4937686631281658283,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,14404826323937180454,4937686631281658283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,14404826323937180454,4937686631281658283,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,14404826323937180454,4937686631281658283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,14404826323937180454,4937686631281658283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,14404826323937180454,4937686631281658283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,14404826323937180454,4937686631281658283,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,14404826323937180454,4937686631281658283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,14404826323937180454,4937686631281658283,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:1680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,14404826323937180454,4937686631281658283,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,14404826323937180454,4937686631281658283,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,14404826323937180454,4937686631281658283,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
6KB
MD50c289c9b846c78e03c7ef1677cefccc9
SHA17ad8c681becff1171eabe8569eb3da79c95c25ff
SHA2565da366bde7d1634d613931c8575472fb1f0a655afd0b3d15c1d7b8652b520068
SHA51243ff0a8c68cb00cc2b4d67a5856f4589aeec11e35fd301ba8bf826f5fca7d136698b8717708678ee56ec37e6861885d21c0f8cfc09faf24155dc620885d53b58
-
Filesize
6KB
MD5136fcbbf87c70a5a785e9cc8c06a7866
SHA17f07ee812aaddb2256e915834413f30739ab738b
SHA2562ed02f52f8cd152fb0edc757b32ad622119b256f5458d73ad300143e70303057
SHA512e0ef428c1782392c86fdd4b2886f85088d13c49ff66a256423638928eab35f6a8ef3bafa873a3beeb9350bd56a52c6e9de61521ae5574d47b41006de27994c71
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD529f2a4a7ef1f90d62c34a8daf631f69d
SHA1d48b8db49e31dcf9ffee4b1c60fdb571d0d0b45f
SHA256688c381220554ca149a6b0969fafb7f1925962c37e0bbc5023555ae1b5f9d0d4
SHA5125381a8653a21ccb6ae0b46e9402c4867e42e3acc7b27dfb74d366d5526dd466c8c844830542a3c24176f13c2b845cdb6e074af787e8c8ef8512d451519534f2d