Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
59ab7602f48048792530a030c5d4d275_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
59ab7602f48048792530a030c5d4d275_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
59ab7602f48048792530a030c5d4d275_JaffaCakes118.html
-
Size
188KB
-
MD5
59ab7602f48048792530a030c5d4d275
-
SHA1
b6fb2d5044d09d8289c8cdb9603608c4c03a67ff
-
SHA256
48917220172377e5c2871670f7ae69a0459671ddb7ec735e6b5a4c09a5550b47
-
SHA512
796d821373e67fe87871379cfa718b057dbe8f349dc82ea122ec5017c63f5dc4e0f56a8e16e69a5196c53629d1df17167dd23523384fdb8ab25b2fa2a385c3f4
-
SSDEEP
3072:2yfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:zsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 1460 msedge.exe 1460 msedge.exe 2748 identity_helper.exe 2748 identity_helper.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1460 wrote to memory of 3076 1460 msedge.exe 84 PID 1460 wrote to memory of 3076 1460 msedge.exe 84 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 4784 1460 msedge.exe 85 PID 1460 wrote to memory of 3060 1460 msedge.exe 86 PID 1460 wrote to memory of 3060 1460 msedge.exe 86 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87 PID 1460 wrote to memory of 4656 1460 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\59ab7602f48048792530a030c5d4d275_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8797f46f8,0x7ff8797f4708,0x7ff8797f47182⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6601003947144212049,14118861514053405744,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6601003947144212049,14118861514053405744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6601003947144212049,14118861514053405744,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2784 /prefetch:82⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6601003947144212049,14118861514053405744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6601003947144212049,14118861514053405744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6601003947144212049,14118861514053405744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:82⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6601003947144212049,14118861514053405744,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6601003947144212049,14118861514053405744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6601003947144212049,14118861514053405744,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6601003947144212049,14118861514053405744,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6601003947144212049,14118861514053405744,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6601003947144212049,14118861514053405744,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:64
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eaaad45aced1889a90a8aa4c39f92659
SHA15c0130d9e8d1a64c97924090d9a5258b8a31b83c
SHA2565e3237f26b6047f64459cd5d3a6bc3563e2642b98d75b97011c93e0a9bd26f3b
SHA5120db1c6bdb51f4e6ba5ef4dc12fc73886e599ab28f1eec5d943110bc3d856401ca31c05baa9026dd441b69f3de92307eb77d93f089ba6e2b84eea6e93982620e4
-
Filesize
152B
MD53ee50fb26a9d3f096c47ff8696c24321
SHA1a8c83e798d2a8b31fec0820560525e80dfa4fe66
SHA256d80ec29cb17280af0c7522b30a80ffa19d1e786c0b09accfe3234b967d23eb6f
SHA512479c0d2b76850aa79b58f9e0a8ba5773bd8909d915b98c2e9dc3a95c0ac18d7741b2ee571df695c0305598d89651c7aef2ff7c2fedb8b6a6aa30057ecfc872c5
-
Filesize
5KB
MD53329b514217c63afecb708bcafc31d7f
SHA1e7d6ce52f2fc2487af242c1b4a892cc74a5a090b
SHA2567a4bf01cebdc1ac11ce1ad3096072cc2ecc250dba4ea51e248573c2068027c66
SHA5122087c96be1883f9883e88dc882aa7e273f9cb977ee349b9867e86df04e472849f745e76e5e44b77ec15d971c547b54b56b105db2daeb48432a862e394c87d7f1
-
Filesize
6KB
MD55138acb78e02ece7f6cc64ea84d22fb6
SHA184e72e1959696b9d0c1f4168766ab09cb961f52a
SHA256d8eb34fd089e6928123fd1649a77769fd6fd1b0f643f46ce482314c7215e36e4
SHA5123f5d8207cf3a115195166c5053126620eeaaa7c31ad30ecdac0cfa949b2971b36d2dbaeee4b7ac25c711557b887cf5ed41791c4ac70ec3bf24a4f342494c14ea
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5a4c3f23eed47d8a1726bd1761bd47fb8
SHA1e2a1329bcaef2b5e1c0a6a74c3559f9745c198f1
SHA25677ecf65ddb76cbc998a8aa0b56c0cde56788e1492d71bf383054babfb6fbe7e5
SHA512ce6f6cb9c11f9757085052e63e5a0816d24af56f5ee4fba8794bc52671af45ed34324901d1a06d008de7bb3b4306ddcdfd1b7763ca635a6ce169545b6d6a1413