Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
46226a25360db75b0ec1a54293b33de5_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
46226a25360db75b0ec1a54293b33de5_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
46226a25360db75b0ec1a54293b33de5_JaffaCakes118.html
-
Size
2KB
-
MD5
46226a25360db75b0ec1a54293b33de5
-
SHA1
2e52e79734709ea4099a95b67d54ce0b603bd04c
-
SHA256
eeb56298bb64914633dfa1b4d7d69acb478ccc45a502bfecc7478b465b90a3c8
-
SHA512
97a61ef432993e1ed0c20a75389eaa354a5fd6e34e0a11184a5561e53536988f12ad474443c9c9d44fb292b34017bae62effa9f40fdd7dad0c7afb550dbd080b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 2300 msedge.exe 2300 msedge.exe 4808 identity_helper.exe 4808 identity_helper.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1016 2300 msedge.exe 83 PID 2300 wrote to memory of 1016 2300 msedge.exe 83 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 2004 2300 msedge.exe 84 PID 2300 wrote to memory of 4472 2300 msedge.exe 85 PID 2300 wrote to memory of 4472 2300 msedge.exe 85 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86 PID 2300 wrote to memory of 1896 2300 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\46226a25360db75b0ec1a54293b33de5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa2da946f8,0x7ffa2da94708,0x7ffa2da947182⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5737664371175149543,9166119870288842246,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,5737664371175149543,9166119870288842246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,5737664371175149543,9166119870288842246,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:1896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5737664371175149543,9166119870288842246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5737664371175149543,9166119870288842246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5737664371175149543,9166119870288842246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3984 /prefetch:82⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,5737664371175149543,9166119870288842246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5737664371175149543,9166119870288842246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5737664371175149543,9166119870288842246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5737664371175149543,9166119870288842246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5737664371175149543,9166119870288842246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5737664371175149543,9166119870288842246,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
6KB
MD5caa7a86095297512140e94a332d41881
SHA185074949f083846098f5fdf63e8c4383d7a1d3f2
SHA256662e89fb82733f4c86da7f38c2f9872531929ccd425586752a8610d6922b09ea
SHA51228397a20574815fa4da8dec1c446c02374e0656a30473f5bbf781383acabb525afcc733e7541f5dc1af09d410fe58dc4fcd53e59d898f2c5f9b724c94f146c3c
-
Filesize
6KB
MD5ffcabbca60445826958d07862e118ebe
SHA110454728f93eb6469d94f685d2d64b61add6ceea
SHA2564bab127a4c8831177239037c9e1f951f76d44d99e218f2bb07717ad9111f5cb2
SHA5128b6b51842c4d0e2f37aeeecde5b61fd7b4e6ab129dc0d3c423079eda59ce48002c1fe5da8c1cc05801a2dbf9c8d906ab5d727f3ea2cd83864483ff75671531ce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57c9bd2fe83bd623038aee690efb1b2ac
SHA18e532cb39d69e5945b2d46f8b7f962ba13dc2b0b
SHA2561d949562e869d6f9d7185d968a2252699d4593149c8b8a57b1805481d9e3d283
SHA5125ce62c5c3406d22ff86c88df22474611e3b0679503c90a2f7f024b9a6744226b86db03c41f3aa2f57225ae6b7c85cda67d783b21757504aac9ec2170a880733a