Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 14:31
Static task
static1
Behavioral task
behavioral1
Sample
4a1355880f06dd77fc708d13b9337af0_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4a1355880f06dd77fc708d13b9337af0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4a1355880f06dd77fc708d13b9337af0_JaffaCakes118.html
-
Size
47KB
-
MD5
4a1355880f06dd77fc708d13b9337af0
-
SHA1
c752dec4517e9c444f74449a70a9ef7913479ef6
-
SHA256
13a2310337aa3acb7d1e9f17cc190121c7161b985311d92edb68ddb353f02777
-
SHA512
7da1500c420f3a15fb85be61d0bf918ec731f44a9fef43e7f73f728fc8b388c223256612162db477ce35a13ef5e5965b5de24f770c974ae4a986d39aefe266e2
-
SSDEEP
768:mSHSSSNgoEWTsBp0MLOaaUeip39jRkEbPn2zBHxpU:mSHSSSNgoEWTsBp0MLOaaUeip3M8Pn2C
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5096 msedge.exe 5096 msedge.exe 1496 msedge.exe 1496 msedge.exe 1004 identity_helper.exe 1004 identity_helper.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe 3048 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe 1496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1496 wrote to memory of 2396 1496 msedge.exe 83 PID 1496 wrote to memory of 2396 1496 msedge.exe 83 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 3680 1496 msedge.exe 84 PID 1496 wrote to memory of 5096 1496 msedge.exe 85 PID 1496 wrote to memory of 5096 1496 msedge.exe 85 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86 PID 1496 wrote to memory of 1536 1496 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4a1355880f06dd77fc708d13b9337af0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff035446f8,0x7fff03544708,0x7fff035447182⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,6107603245318072723,4789842655405739645,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2264,6107603245318072723,4789842655405739645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2264,6107603245318072723,4789842655405739645,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,6107603245318072723,4789842655405739645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,6107603245318072723,4789842655405739645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2264,6107603245318072723,4789842655405739645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2264,6107603245318072723,4789842655405739645,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5888 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,6107603245318072723,4789842655405739645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:3368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,6107603245318072723,4789842655405739645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,6107603245318072723,4789842655405739645,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2264,6107603245318072723,4789842655405739645,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2264,6107603245318072723,4789842655405739645,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
186B
MD5c29c401ad70127d82f9d3678a4eb6b0c
SHA14ba6786409ab2150881cc284415b4c100417509b
SHA256707a3b8c72f7a0e28d61dcb67091b7b3fe9bc63dbd599824eca656fbc9884eba
SHA5126c3b0885e34b7b6b66c7eb787710350f2d725e300e8c8795961629f15075c9d042eaab8632e4f50d187931717223e0a8e7091a32fc8a508eb9cd40a5464b1062
-
Filesize
6KB
MD571d52f26edf2647b85bfd18ced593cb2
SHA1b8cb13e8a8f227f8366267f25df1d3864f368b66
SHA2565a399b710ac4b3f6f2883e9266e01230e4df2e0c031f112f8e74ba6a294fb504
SHA5124ac245df5117f658387ca9df83a4b38854e7c7cfe2e23120c8e8a7bb7c404ee5d75df66a195317169f675c000355fc41e46c53fa9179044754cc01a87b3cd2dc
-
Filesize
6KB
MD527ce115f6ec981126dea8cef0a412e9e
SHA13d1ae248a396ba2f747883e2acd3db6032080b89
SHA256efb91605ee646384ca23ec02de31a9b79ffe1830ddf77e9c78d026b19cda31a1
SHA512e9cfedcdfe3d403c84e9865f7e55f3d4e08f238aba62d525595abb9d374d0b851dad1b750fb1a9267c82b9d3ce02191d8c6e2b5027c255541618f831e92cdbb6
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5d68083eb3bd9b807e0cd96730e34cc06
SHA154baa600ad44188aa99e7a0303b64556d9984892
SHA256d32060ba61104b05d8c30ccb6458c19fa4b314c7e53a50e76735009ccc9cf9f6
SHA512caf1926d0e9963aa6d0b5bb624d24d3542ec30574eed881e93155f3a51cbc72de97010d4cdaa5a4d68b8debee208ecd5160d95a90d5164429ec70b59c9335206