Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22/07/2024, 22:33
Static task
static1
Behavioral task
behavioral1
Sample
651040383f5718e09057a0dc67c5cc67_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
651040383f5718e09057a0dc67c5cc67_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
651040383f5718e09057a0dc67c5cc67_JaffaCakes118.html
-
Size
117KB
-
MD5
651040383f5718e09057a0dc67c5cc67
-
SHA1
708a9462af5fe6d816eb0beebb9961a177db368f
-
SHA256
0a6fabc8571f418e598e1addd63f8d22ddcb98f734c089d17f990ff859664377
-
SHA512
8a4dffded100105e62f0d70a70a6f6949d6990a2ae3a38c152ee210fef82c3455d863289bec5fb5f5afdb0fcd0c619b06b0a8cc7488d837cba89675d29d8f40d
-
SSDEEP
1536:OJtOtU1/AXnVNozHlNn10gi0y4X/ELJZ/zRBHLrsLL:n3yeJo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2720 msedge.exe 2720 msedge.exe 4480 msedge.exe 4480 msedge.exe 5012 identity_helper.exe 5012 identity_helper.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe 4996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 1048 4480 msedge.exe 84 PID 4480 wrote to memory of 1048 4480 msedge.exe 84 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2072 4480 msedge.exe 85 PID 4480 wrote to memory of 2720 4480 msedge.exe 86 PID 4480 wrote to memory of 2720 4480 msedge.exe 86 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87 PID 4480 wrote to memory of 3200 4480 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\651040383f5718e09057a0dc67c5cc67_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8feef46f8,0x7ff8feef4708,0x7ff8feef47182⤵PID:1048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,7064397255062683157,7763119641494172,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,7064397255062683157,7763119641494172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,7064397255062683157,7763119641494172,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7064397255062683157,7763119641494172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7064397255062683157,7763119641494172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,7064397255062683157,7763119641494172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,7064397255062683157,7763119641494172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7064397255062683157,7763119641494172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4884 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7064397255062683157,7763119641494172,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7064397255062683157,7763119641494172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,7064397255062683157,7763119641494172,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,7064397255062683157,7763119641494172,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
5KB
MD5d180eb436965c17b4a788a6d74b3340e
SHA1a9a60ea93887be69d6aa51427ef279b06ce25325
SHA25691c9fb411b5213b238dff3c982e28758f76ba5ff4834d7b5bc7b685ced378f97
SHA512a5a06b4d0c96294ba55059b40fedc3347b40987a8667f37a9c1180020554a2d8b53e6e167e4cb8be6d079cf04af8442acabbd1ba5dd61fccb9077b3ae641db90
-
Filesize
6KB
MD58c21635c251ab277b955dc01896318f8
SHA1c80dc998b044f5c79ee027457cc1890b73007062
SHA2569bc4c7ed3b088dee6225cbc570d148669339be61f45b87fa8fb09f3c7229bd63
SHA51215fbe4201326304a79febf15bed8055d6109d048fc2cf01f64954494a1cb47fb480b969acf8fdf0735df283312d3ca223bac6def6bec7f1e847988ef760d7dc1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5055704360a31ef3943fa669b122564f2
SHA1879cbd9bbea498c261be1b4464cd1f8bded8fc01
SHA2567a78d859ca36224996aa3f4f50d89b276a27918e1318d2ce0b3118e30f844d86
SHA5128c32f7dfe37cd728b456eb189ca7c930cc01f2066a8425052fb23d1d27f4a2cd2a3a213d138a241617900e1272610dff8b8e8e3f46833cb855a03742d14487a2