Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 08:19
Static task
static1
Behavioral task
behavioral1
Sample
450527f6a4589de7c496f40158336501_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
450527f6a4589de7c496f40158336501_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
450527f6a4589de7c496f40158336501_JaffaCakes118.html
-
Size
8KB
-
MD5
450527f6a4589de7c496f40158336501
-
SHA1
0670ab79a46f73e92560472e069d79918d03f9f2
-
SHA256
d66ab268ab80b4401d7322440af04cc2d478d139ca4173861e729096caa5edc2
-
SHA512
84e85c89b4f2d97c95dc406fdb2f3b04aa413bc86d986704e2c41febc1d423da59c3a8d3bf27daeb3212a4f87f6303c678804f8c618c73a9c267a8bb1e249838
-
SSDEEP
96:uzVs+ux7UO6OLLY1k9o84d12ef7CSTUrzfIneX8qH9ai+uNseijNi3ScEZ7ru7f:csz7U/OAYS/GvHSb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 3380 msedge.exe 3380 msedge.exe 2068 identity_helper.exe 2068 identity_helper.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe 804 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe 3380 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 3352 3380 msedge.exe 85 PID 3380 wrote to memory of 3352 3380 msedge.exe 85 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4052 3380 msedge.exe 86 PID 3380 wrote to memory of 4940 3380 msedge.exe 87 PID 3380 wrote to memory of 4940 3380 msedge.exe 87 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88 PID 3380 wrote to memory of 4408 3380 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\450527f6a4589de7c496f40158336501_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd77d346f8,0x7ffd77d34708,0x7ffd77d347182⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,18438287755451460708,8388266715501067296,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,18438287755451460708,8388266715501067296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,18438287755451460708,8388266715501067296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:82⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18438287755451460708,8388266715501067296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18438287755451460708,8388266715501067296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,18438287755451460708,8388266715501067296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:82⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,18438287755451460708,8388266715501067296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18438287755451460708,8388266715501067296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2408 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18438287755451460708,8388266715501067296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18438287755451460708,8388266715501067296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18438287755451460708,8388266715501067296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,18438287755451460708,8388266715501067296,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5284 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:804
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:364
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
Filesize
6KB
MD569c3317d93ba4c21ac16c864f792327f
SHA13e08d0b233234229c7d57b9c7b630a868f875526
SHA256fddb81c7c28a501881238fab55afde931cdc66a63ba2c99ebc951d0e399c5119
SHA512090f1f82feeb5fa028745c232ef5be224b51afd6e3f0d070d58aeb699d0ff2f85545eacda43a6d90b3f9d9daf19cffaae6ea1e7b7617a2424552a567a33bfac2
-
Filesize
6KB
MD5cbbb11883f7946ea88f6081da736dc61
SHA1b12e09e72a7031f31302b7517cc76ba69485fc08
SHA256b0651f36d8a406b16b6d58eb1f340066dd48751d0841d8a6e979034c28ef6766
SHA5127afe36bedcf47ff3c64cea6507ad71870b9721c0384d5a34297c7ec066bbf90c1c818bdf770c694f34e6247994d2679606ae1ce315a6b875cc0d3fc3159ca793
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD50daa864f71bb1594efa4a485a91c3dd3
SHA196b88b6e9e0f849ff137ed9a1999e708dbf00791
SHA2565962640477777e563533141c95b3a91e66c04be558171701f7d49469deba8ed3
SHA5127d9a9d6d00549af64ba00c6b0d322874fac6202ae14a1f293b84593a8ceacd28e29290e062fe997803ab269724d0a1549c050b91a0f0b4e1087e92d157ae41d7