Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
59b99714a46ce29b5aacd7f815521568_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
59b99714a46ce29b5aacd7f815521568_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
59b99714a46ce29b5aacd7f815521568_JaffaCakes118.html
-
Size
139KB
-
MD5
59b99714a46ce29b5aacd7f815521568
-
SHA1
29f89c3a62f3b297f5fa09169c06bf80dc05cffd
-
SHA256
526c0f33d1f7f1f5fee1bab6a9014671710925aef634a8da6540643f638c84d5
-
SHA512
dabdb62951ebc8ae18c21f8f65b8370cb237cfdeb1acbfa1a265d7367f51bf9932bf4a1274b5ae115f59100e646dada51d84470bff90bfb60f548ef9cf54dc67
-
SSDEEP
3072:Sd7hyQFFBpppppppppCe1rrrr/rrrr/BrrrrTrrrrVrrrrKSrrrrArrrrVzrrrrk:SdcCpbN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 3400 msedge.exe 3400 msedge.exe 4420 identity_helper.exe 4420 identity_helper.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe 2120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe 3400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3400 wrote to memory of 5104 3400 msedge.exe 84 PID 3400 wrote to memory of 5104 3400 msedge.exe 84 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 3488 3400 msedge.exe 85 PID 3400 wrote to memory of 1636 3400 msedge.exe 86 PID 3400 wrote to memory of 1636 3400 msedge.exe 86 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87 PID 3400 wrote to memory of 216 3400 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\59b99714a46ce29b5aacd7f815521568_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffbb8f46f8,0x7fffbb8f4708,0x7fffbb8f47182⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3896844391220435598,3767194462114838636,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,3896844391220435598,3767194462114838636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,3896844391220435598,3767194462114838636,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3896844391220435598,3767194462114838636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3896844391220435598,3767194462114838636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3896844391220435598,3767194462114838636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:82⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,3896844391220435598,3767194462114838636,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5320 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3896844391220435598,3767194462114838636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3896844391220435598,3767194462114838636,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3896844391220435598,3767194462114838636,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4028 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,3896844391220435598,3767194462114838636,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,3896844391220435598,3767194462114838636,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2556 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2284
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58dc45b70cbe29a357e2c376a0c2b751b
SHA125d623cea817f86b8427db53b82340410c1489b2
SHA256511cfb6bedbad2530b5cc5538b6ec2184fc4f85947ba4c8166d0bb9f5fe2703a
SHA5123ce0f52675feb16d6e62aae1c50767da178b93bdae28bacf6df3a2f72b8cc75b09c5092d9065e0872e5d09fd9ffe0c6931d6ae1943ddb1927b85d60659ef866e
-
Filesize
152B
MD51790c766c15938258a4f9b984cf68312
SHA115c9827d278d28b23a8ea0389d42fa87e404359f
SHA2562e3978bb58c701f3c6b05de9349b7334a194591bec7bcf73f53527dc0991dc63
SHA5122682d9c60c9d67608cf140b6ca4958d890bcbc3c8a8e95fcc639d2a11bb0ec348ca55ae99a5840e1f50e5c5bcf3e27c97fc877582d869d98cc4ea3448315aafb
-
Filesize
470B
MD5d2483a87c4fc1998559d11f79e28c93d
SHA1b4c37e1d52a4c24258583781637fe148ab10c8a5
SHA256a06019f0dc7ce71986d1ab092341a3b6f91d49ecb776e1ad211a2abc550cf3ca
SHA512d3aadbd9f67978afc2c888a4e3e8b76362a0f47b3e4c36151bbf062a5c65adae959a45e3c4c15ea9f73152496935979655237e221b1547f139bc7a613b507ddd
-
Filesize
5KB
MD54497b6ceff638a95c879390e5215cfbf
SHA1c400c83ab9fe8312a03feefd8e7c1ef079df1300
SHA25673c6baf457984cfe379c8b58f0de1974c86dd0ddcaa31d4d5b0a89bb52cecc64
SHA512c09f18aa2061cba2450f45b9dc3a3d25e2143678295e3e44f86df6671fa2c2a0439f97be8064ce61dc3f61b6f3443c9bb88f367ef26b93c4189e2ae6fa0a6a12
-
Filesize
6KB
MD5347853507b43cc1e0406ddf5358a3a14
SHA16919dedf10de8691496c01cf6e2ab828301d65e7
SHA2560a6aade764f4555fec8267b34a3cf9c017a41a10d2205b1e7863765b16134d34
SHA512cb4b7afd0a29a5e43980e21618ed59b59e052c51e4d9814ec7d1d2f366e7919cad1584c3dbbc2456f3e6b4c04d42356fa7f14cdfb7fc678e6ab0811e122e8ac5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5bdd7b16fa0258c72b4416550dff43b67
SHA1239256e10594c23a5af00fcae8cf4b32ddfa8e3b
SHA2565aa2d247b9ed95883a35ce805b1e6b80aff900bed8a053c998e4846f827387e8
SHA51231a1ca10d065c502d42230cad2c1478e932e8cb95da3d75081c893649a4024c85e9614972beac717c579d574d2a112bbc9c0802c6b2fae474a18e8c66afd8b5f