Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
631c4224d4f67b601e3432d36093f1dd_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
631c4224d4f67b601e3432d36093f1dd_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
631c4224d4f67b601e3432d36093f1dd_JaffaCakes118.html
-
Size
178KB
-
MD5
631c4224d4f67b601e3432d36093f1dd
-
SHA1
ccb4cc736ecc91bcf7973b432a7863be5bec2255
-
SHA256
e43420744a57dfa2570b688ff729af2c8a49185e9c792fb04e0d737de1b5ad03
-
SHA512
7dad05abe48b4c0beeaaabdf5e32a525337372ceed4d6b77d5797d421db1e5c0ab96a5de4f1f37dfd03f7bbaf9c140c39b09771ed5dd43cf188cdaf7ffbe001a
-
SSDEEP
3072:SgEyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFiM:SgJsMYod+X3oI+Yn86/U9jFiM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4412 msedge.exe 4412 msedge.exe 4268 msedge.exe 4268 msedge.exe 4072 identity_helper.exe 4072 identity_helper.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe 2896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 3436 4268 msedge.exe 84 PID 4268 wrote to memory of 3436 4268 msedge.exe 84 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 1184 4268 msedge.exe 85 PID 4268 wrote to memory of 4412 4268 msedge.exe 86 PID 4268 wrote to memory of 4412 4268 msedge.exe 86 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87 PID 4268 wrote to memory of 1164 4268 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\631c4224d4f67b601e3432d36093f1dd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab1f046f8,0x7ffab1f04708,0x7ffab1f047182⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15416418471167105580,15559187703193672538,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,15416418471167105580,15559187703193672538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,15416418471167105580,15559187703193672538,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15416418471167105580,15559187703193672538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15416418471167105580,15559187703193672538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15416418471167105580,15559187703193672538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,15416418471167105580,15559187703193672538,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15416418471167105580,15559187703193672538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4276 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15416418471167105580,15559187703193672538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:12⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15416418471167105580,15559187703193672538,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,15416418471167105580,15559187703193672538,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,15416418471167105580,15559187703193672538,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1376 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD58353a5c82915a964227db93f9c433abf
SHA1054a21f9754dc82a5acdc90a91dfe37a4ba5138a
SHA25624bdf17074fbc52100d034496939ff4e1d34cbdef604eeffd898893e50aa50c2
SHA51207e018a3088c04a0b8530d58efcf673b4fd21778d2c952361f9356826823297266049a61d7a80910d6f302166873e7e7425a570789b212dfe2a6fc341a3f81dd
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5533eee1675d9757779c254418573b480
SHA18ad030fe3fb32296ecf8f3d81bf580ccb41ba821
SHA2569357fd66811ab61310c80fe886536ab756e5c136568830b84d23ad2a20218275
SHA5127d1bab14d09da82c237fadc3778fa2ede46735eab31746b983e2adff2095daa0e494f984f1a66e799a13683c02ac55d5dee0393cabede736eab94c77f79c3d6f
-
Filesize
6KB
MD57056afb1805d2dc637fac84169eb8112
SHA1256352b33e3f09749b18faa44bd381d48a215d68
SHA2565aca68aa2945ff2e6b3ae1542f373b6b9cbb00e7e6f0d49277b6774ffe3b7694
SHA512a2f189fbae1ae6c1c36427c7e74ca38e2ec678f36665dee8a6c352fc89e91fcfb480c7f89843b090974d2657a665ea9b0e4e902bcb8e93a9089c828e0f1516b0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389