Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 09:42
Static task
static1
Behavioral task
behavioral1
Sample
5b6849c71b571d112fa8197a8a108005_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5b6849c71b571d112fa8197a8a108005_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
5b6849c71b571d112fa8197a8a108005_JaffaCakes118.html
-
Size
86KB
-
MD5
5b6849c71b571d112fa8197a8a108005
-
SHA1
9a9fa53ac38fb2ba6833546e2874a23a86cba7e8
-
SHA256
1738f84eb9477faca247ea6ce3e737abad1038546341deb1ba43a69d546a488e
-
SHA512
ba4d9f7a59ce177840e45bc4e88245f0bcc9dcc8e0706d38cd65206de6e1e395857bcb2967af717dc5dc0811e54691eec5f38b93c081aab5299bd8d03f6749d3
-
SSDEEP
768:rOfiAPMz3kW1T0YRwTIGmuGbUwuifnC3YoXt:rOfiAPMz3kWWTIGmuGbU3ifniYo9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 960 msedge.exe 960 msedge.exe 3868 msedge.exe 3868 msedge.exe 5112 identity_helper.exe 5112 identity_helper.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3868 wrote to memory of 4764 3868 msedge.exe 83 PID 3868 wrote to memory of 4764 3868 msedge.exe 83 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 2568 3868 msedge.exe 84 PID 3868 wrote to memory of 960 3868 msedge.exe 85 PID 3868 wrote to memory of 960 3868 msedge.exe 85 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86 PID 3868 wrote to memory of 4340 3868 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5b6849c71b571d112fa8197a8a108005_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffb99446f8,0x7fffb9944708,0x7fffb99447182⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2530183767226387590,12416159892578371994,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,2530183767226387590,12416159892578371994,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,2530183767226387590,12416159892578371994,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2530183767226387590,12416159892578371994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2530183767226387590,12416159892578371994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2530183767226387590,12416159892578371994,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4152 /prefetch:82⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2530183767226387590,12416159892578371994,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2530183767226387590,12416159892578371994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2530183767226387590,12416159892578371994,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2530183767226387590,12416159892578371994,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2530183767226387590,12416159892578371994,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2530183767226387590,12416159892578371994,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
5KB
MD5a01a2551175bdf3151b78fa4ed7be043
SHA139115c4506dc0fd4a6dc5a737321b0c698d1eccb
SHA256b005583da8ab27f2a4376e6badf2d2c1987554e75cc3b2e35b0c1f5192ad8042
SHA512c557f591f0f6f8f9eefbe9b72284743a3fe8a08f00b3cb193ffe11a3ac79d05e6c8e7b02fbe0e678fa0a42a0cf8c3a2ff6033466fa9c4e6b371c13d4e556ed26
-
Filesize
6KB
MD5ec27903a2bb5534688bb8320efa20319
SHA134c08132e94b668ab418a50271eb9333ec26f2fa
SHA256fade47d9965a7a680739216ddf1b36db06fff7e7c842d7da7eefd0a16828d252
SHA512b7662b9a088c5d18a1831625ac74bac9f197cdb64e0a0ee6bb7b12a8e6d4e8a3618622fa1a28d1030c16f0177751e4b47af961504f42638c17877e81f2518bbf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e23e62f7a8e94eaaa5e1eea81f3a9c14
SHA1675d26f308688055e4983aabbebd1419f6112495
SHA256eb92d448a0d3a3f3f47c21a9fba91ef8158bb8095f4da9737dc5390c149e2ef0
SHA5121d451dcddda86280c3a3359baec1a9c2592a46bc67b2791d4eacc968acdd62e529b5d39a47c2cef3f77a6aa68816272a477ff77792bb29c61c851d055dd1a033