Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 08:06
Static task
static1
Behavioral task
behavioral1
Sample
626d0d0bf204e8056f0adebfc10d5d37_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
626d0d0bf204e8056f0adebfc10d5d37_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
626d0d0bf204e8056f0adebfc10d5d37_JaffaCakes118.html
-
Size
53KB
-
MD5
626d0d0bf204e8056f0adebfc10d5d37
-
SHA1
7bc339e6277059a7192074e1f6226366a57cf09b
-
SHA256
1b7235066b0ea60e5af50dd134b8e4313d5c36678d40da392d124daa6a9b542a
-
SHA512
b201757b4f3951b09f51c96cf5071fede5670bd78dce768410b2d6c4777334eac8fc2b3c37ac86550bdb616312df77178dae802103875e41d409197eca80ae74
-
SSDEEP
1536:CkgUiIakTqGivi+PyUDrunlY663Nj+q5VyvR0w2AzTICbb8oX/t9M/dNwIUEDmDE:CkgUiIakTqGivi+PyUDrunlY663Nj+q3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1496 msedge.exe 1496 msedge.exe 3216 msedge.exe 3216 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3216 wrote to memory of 3888 3216 msedge.exe 84 PID 3216 wrote to memory of 3888 3216 msedge.exe 84 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 4420 3216 msedge.exe 85 PID 3216 wrote to memory of 1496 3216 msedge.exe 86 PID 3216 wrote to memory of 1496 3216 msedge.exe 86 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87 PID 3216 wrote to memory of 1340 3216 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\626d0d0bf204e8056f0adebfc10d5d37_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb870146f8,0x7ffb87014708,0x7ffb870147182⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5804 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,18139691792446867446,14198624950872685617,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5312 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
402B
MD5edc4e61212d41d53d6454922674d9f05
SHA13fce581f780037baed2a410dd7867631a56eb9bb
SHA256dd7a81aec60e3b1c9f32fc6a7f3caf113191727253d08bec82d31c13ea37e11e
SHA5129a8b1f845cb2361e59dc073e3387c14db1988f7799eb261901bcd4ff0d5b649bf8f8771a2a478ec86bc38f02b55663bced9f0dd416ab4eb09228b9e86f405833
-
Filesize
5KB
MD5e82145641548edd8f1f555b09f2cc869
SHA1994d338ef11b2d0d004d452691fa9a6709a7e3c4
SHA256da42597803f117cf37bacbce4cdb089bae5b72928ac551ec81b9fa4444d9e537
SHA512985107060eba1c77e3dd9f68f0f62d822af75c6da1dc6390a7153d006990e9417ed097360c30d74540058eb13a55deb5e9e7ed1dfc88d879179c84e4fdde58f7
-
Filesize
6KB
MD5c9491561559649948d45b09354806291
SHA1bced3cf0c3d33392acff63afce88e910761bd205
SHA256a0fed58f462974abea0bd44ecb7869e0bbf2fcf02297fc13a1beb99a512f02fa
SHA51254b0dbb668d7f8c7e495629e9fb90612fbc78e59d2cc24ba281666f86efc48447fa8d78401c2ad38d8a385b3f8fa6aba900ce875316494c8bbee1143078a4778
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD595f30bf4684716cde93885918896a775
SHA1107a239cc57512b31f0673753ef3c9e58545da08
SHA2566ad31787b1e59f71cf7804453a31d740ec4ed3b708f28cf1c597cd8c2c1bc15b
SHA51213b10d27a3f28a8fb1b236e94eea150251a5e5029f69d857feeda56bb5467160af2e5e3ed0cbb4d00563c3418bcc2ecd932ae10c7eca89379fe68004a8f4022a