Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
59d2b1fe5a069e6e77ef281510611b55_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
59d2b1fe5a069e6e77ef281510611b55_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
59d2b1fe5a069e6e77ef281510611b55_JaffaCakes118.html
-
Size
17KB
-
MD5
59d2b1fe5a069e6e77ef281510611b55
-
SHA1
2bd42291017b9747f7a3381d47e018481f8f7957
-
SHA256
50a11a5808078ea92d12f6fbf8c678d89c827e07bd6c794d0df8a89a90bf3576
-
SHA512
1640ae6d0c89f8d2baf0fe92c6407c375fbfff54e42169bd5e8ec688aa218f13c97197d72939a6d37f85086bc50c528fe2fbede1b31ea219b27a7ed79ed92d98
-
SSDEEP
192:1IyuEr0u6jv5MDwHjp9rR86iESQ1EI5HTAg0RAMfKYalsVdKNdghi1CR4NL4Rr+r:1IV5RFvTHv4ETZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3700 msedge.exe 3700 msedge.exe 2416 msedge.exe 2416 msedge.exe 3608 identity_helper.exe 3608 identity_helper.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe 2416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2416 wrote to memory of 4952 2416 msedge.exe 83 PID 2416 wrote to memory of 4952 2416 msedge.exe 83 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 1904 2416 msedge.exe 84 PID 2416 wrote to memory of 3700 2416 msedge.exe 85 PID 2416 wrote to memory of 3700 2416 msedge.exe 85 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86 PID 2416 wrote to memory of 1216 2416 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\59d2b1fe5a069e6e77ef281510611b55_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae1a346f8,0x7ffae1a34708,0x7ffae1a347182⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7078375629781964933,3863284918826151404,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,7078375629781964933,3863284918826151404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,7078375629781964933,3863284918826151404,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7078375629781964933,3863284918826151404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7078375629781964933,3863284918826151404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,7078375629781964933,3863284918826151404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,7078375629781964933,3863284918826151404,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5476 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7078375629781964933,3863284918826151404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7078375629781964933,3863284918826151404,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7078375629781964933,3863284918826151404,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,7078375629781964933,3863284918826151404,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,7078375629781964933,3863284918826151404,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5c00b0d6e0f836dfa596c6df9d3b2f8f2
SHA169ad27d9b4502630728f98917f67307e9dd12a30
SHA256578481cd359c669455e24983b13723c25584f58925b47283cb580019ef3142b1
SHA5120e098ab5f5772fec17880e228a0dccbbaa06dc1af14e0fd827f361599c61899fe07d612a7f7b049ff6661d27fdc495566dd20fc28ceed022b87c212bf00be5da
-
Filesize
152B
MD554f1b76300ce15e44e5cc1a3947f5ca9
SHA1c978bfaa6ec6dae05464c6426eaa6cb3c3e2f3b7
SHA25643dec5d87b7ee892a3d99cb61f772ba403882ac0772423f36034e84244c1ca24
SHA512ac26e5676c675be329eb62b5d5a36a0e6014ab8a6366684b0fc2a59ae5f061f596f462b82eb4e9f135d2235a0cbd4af96680d234eecc873a8397fd81507d277a
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
176B
MD5f048e23d816db7dfd0a496961517b8ea
SHA1b2c736610305b3b0afb4d853c45190601b6a2bbe
SHA256b37f2086ad48385461c6aaa3b1d9b9ed05236dfd64c76e981304ff558f2bfebf
SHA512e9415dad560a2e6ae4ed3c56adbb3cb4c48a3f67159bb809ddcdb295b458ed8478451d8a637be5ecea151ea2956472270a2ca16df9be5daf7f536ee649b7ba5f
-
Filesize
5KB
MD5f2a1be62d3a469286c4fb2c9e96a363e
SHA150e99c4ed26f0ad3ec387874bf10d73a26674cfe
SHA256dba55a22eb6d0876ac7dadbfec3d0862bde4705f07145e2f52a2694506539e5d
SHA512dd5d4f2e3455562d5b9628c06a111aae782bdc08ae711a8478f5c20f3974c2044a190486cc769bc1446752f9d32b015a07b8eb862e40791aa300d88cb345b262
-
Filesize
6KB
MD54b1b7494ce5457008c45e37dc30639d0
SHA143d61d7a011bb45be70696be193b5084788806de
SHA256eeeaa4a9c36dd729657ceccf2ab199b2d6ad2f451c2a63682d68ba4261801b56
SHA512b1a5afa5749fd0295858aadc54eb73913040c679fffd99724daf3d4a2765b867549d28ff873c9c0ee8263a7e9fb913c45cd4c279dc7ac8e24874655cc10858f6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD53076561738f290fbb991f9298f06fe41
SHA1d764dc56de31c426cea2184e7a364f5e7e9da364
SHA2561a1ba118f99d0dfc1240b240a57f4c0882c18eea154b066fe01654ef8cf6725d
SHA512643b2462e54dc66ac29a2d7d9036b370237b4037b9f6c0867236c7c17864b6391d2778c1cb5a81ddc9b62f70d3ed84508e384fefe15b7e862a2ce76f3a015af8