Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20-07-2024 22:48
Static task
static1
Behavioral task
behavioral1
Sample
604b38afcdecc253df62413a066eae69_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
604b38afcdecc253df62413a066eae69_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
604b38afcdecc253df62413a066eae69_JaffaCakes118.html
-
Size
7KB
-
MD5
604b38afcdecc253df62413a066eae69
-
SHA1
ba73caca770ff5297c683d387e419e623fd49670
-
SHA256
1a3b6d47920d2905a238210a809efc1f63ae5860872f2daf0b2182d850d91cc2
-
SHA512
55e6a4399ccd195b2c8d2dd1fedeb46bd64435935bcce65098d797a059a2614ebb3bf9572e0a17ad04fa51349436f877df6ffc2bce229860c92cb08679fe5234
-
SSDEEP
192:vFuYeNc++nNSw2n6W7IlmHr8f0tlXo6hNshxosIj:90X+4TnkUAWlXo6ha1Ij
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 224 msedge.exe 224 msedge.exe 1272 msedge.exe 1272 msedge.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe 2404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1272 msedge.exe 1272 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe 1272 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1272 wrote to memory of 4616 1272 msedge.exe 84 PID 1272 wrote to memory of 4616 1272 msedge.exe 84 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 1100 1272 msedge.exe 85 PID 1272 wrote to memory of 224 1272 msedge.exe 86 PID 1272 wrote to memory of 224 1272 msedge.exe 86 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87 PID 1272 wrote to memory of 4924 1272 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\604b38afcdecc253df62413a066eae69_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d53d46f8,0x7ff9d53d4708,0x7ff9d53d47182⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,1193020972958583410,1948401540416884388,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,1193020972958583410,1948401540416884388,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,1193020972958583410,1948401540416884388,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1193020972958583410,1948401540416884388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,1193020972958583410,1948401540416884388,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,1193020972958583410,1948401540416884388,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1276
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
6KB
MD54a315fd8407e33cffc4badf0d762670d
SHA1c0c7f77397cae7830768d9132d26ed4a08d55093
SHA25685a3f7c012709a4970bacdf8a07dbc76795c5075b93bf3863cfc96a2a77ca962
SHA512602a35682280589808a68c8c275004158df19b24acb084bc30ff2e72f0743d9cfe36811dab3a3f809ace988030a714c7e5e4afee95aa5e47474a2e3f22ce83d5
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f021609f-cddc-4140-af11-31bedf5746f6.tmp
Filesize5KB
MD5fd090fa8ee0c0f126d71fc32b1898382
SHA1cc4ab0564a077588e7d6cc7b09ca5ba0d81a12d5
SHA256cd0270061f1fd11e2cad3def449c494253572522e6403404882511d2e010028d
SHA512e3e6b22fe6c044600e66aa3fbe908ecb7914a46996efedda4fe91b42fb0e5b90f1899f049fba9c03c18cfea9119474bbe2f3d98dca1121805137fae10dcf1d43
-
Filesize
10KB
MD55fe48991b17502eb8e977bf959e8a905
SHA17310aa06a76e52debb9d3398215c66b887575da3
SHA256bdd3b08de3b88d5cbb38a7f797de4ce22dbf911ff34097b55ff0a56e08de04b6
SHA512406715e2e48410e34e9e9d9449c03a5d394d24f06cea49c16157bce29b85bd25a98ad90d120f53aa0082cbe37f5e8ffce9861872120a8866639cc7e6c7353a68