Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 00:10
Static task
static1
Behavioral task
behavioral1
Sample
4c011f25c301cfe224da5ea09b742ed0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4c011f25c301cfe224da5ea09b742ed0_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
4c011f25c301cfe224da5ea09b742ed0_JaffaCakes118.html
-
Size
53KB
-
MD5
4c011f25c301cfe224da5ea09b742ed0
-
SHA1
cff7b0a31c0d513f7b0f64171a7c1af30a41a190
-
SHA256
91c20a2e8056c3b400fb824a710efde8e47f6068ccfe8fabfc27d1b1f12782da
-
SHA512
62e7e166cffdddfe892f7ae5a11160b8dddc46961d393f2ae89d9894805a254ff7e9ec0c5b6174dd1eec891dffcdad9dcce97f6cacaa2fe8eb38ffd86db99022
-
SSDEEP
1536:CkgUiIakTqGivi+PyUYrunlYkM63Nj+q5VyvR0w2AzTICbbyoFo/t9M/dNwIUTDZ:CkgUiIakTqGivi+PyUYrunlYkM63Nj+0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 696 msedge.exe 696 msedge.exe 3740 identity_helper.exe 3740 identity_helper.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe 696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 696 wrote to memory of 4416 696 msedge.exe 83 PID 696 wrote to memory of 4416 696 msedge.exe 83 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 1712 696 msedge.exe 84 PID 696 wrote to memory of 4068 696 msedge.exe 85 PID 696 wrote to memory of 4068 696 msedge.exe 85 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86 PID 696 wrote to memory of 5084 696 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4c011f25c301cfe224da5ea09b742ed0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xe0,0xe4,0xd8,0xdc,0x108,0x7ff8a6a646f8,0x7ff8a6a64708,0x7ff8a6a647182⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,220425347168844021,2789999937811963336,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2944
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
403B
MD5f9953b43778061f379ca86a99295b1e9
SHA1e0c5d51687062660b9302e859b7576d463b9198c
SHA2564d1610cbb599966e0939090e12a7012ef33bd447345fc3c69afa8f1263fb6550
SHA51209b4c27b6bc2f596ef9b1c0bfb56ab3c9a0ad0e33b4ca542411450695a3f6d9e679dc4ade89597dea16f707029251b5cb0f130a625a2b0c6de360b053816c1ff
-
Filesize
6KB
MD5a03675ecd59e3f6ce92865cbd41bcbfa
SHA11a034c37bb0cf5a16f064c188034b5176aa6ac10
SHA2566f79195cdf1df695ab58333a4f1b3d1604ff88665d9e82436e363c6f0e09107f
SHA512a652f3d763aada15657addde3678004c55ccfc16ad786f9da1a2d806b98ff56b02f6f42ad80fe47e99095d0f66367dec0141773411c17f19235f9c12548be228
-
Filesize
6KB
MD5b7783a54541826223dfb6276c33795a1
SHA1b9775dc842e63685312c0c87ab8fa1c4272fcf05
SHA256b58d8d98d549cb30757ff5ef36525013c94caa79a0473ae8d2c40244fb81156d
SHA512913876156efb9d6e71602ed4ea0a20cf4dbef2a27fc30efe9e496fb45d135552c194bca43e9115abef29e2efaf87adfc68c3baa722992b86e39cee9f7ddb8545
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51ce86efe5963785b8de1a4c8f6b747ef
SHA1be3d242ec4ca6cfd3df8fad46c95ffed3214f05e
SHA256f88bc092428c8cad5e60faa4efbc4f85ada9fb31ac94568cdd2fef93fa821943
SHA5128b48c16591a2ebd77be0e0ee49add5da548c872a21adb96cdc500210ecfa3a654f45510b9850ac2f31fe74ccaf62da7a303793bab0d2e75a481ba9adc4f4b04b