Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
22-07-2024 17:45
Static task
static1
Behavioral task
behavioral1
Sample
642922106a3ac72f4923de4b9f40858f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
642922106a3ac72f4923de4b9f40858f_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
642922106a3ac72f4923de4b9f40858f_JaffaCakes118.html
-
Size
404B
-
MD5
642922106a3ac72f4923de4b9f40858f
-
SHA1
601f1a89f5185a6bd7e43f5c2c49d023e14ab3f4
-
SHA256
67d1ff5bfdcce0e2b994e7e2b7d3eb3ee523c3cc1dd02b446bc8b8c8971c5f70
-
SHA512
9ac27b4b281c282817892219236e4bdfbbf5562328ee21036d4e2ce38f8a554892edee0205ad5e12fd88153670dfff843a1841426fcec188ca81b4cb7cea785e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 1216 msedge.exe 1216 msedge.exe 4372 identity_helper.exe 4372 identity_helper.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 3416 1216 msedge.exe 84 PID 1216 wrote to memory of 3416 1216 msedge.exe 84 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 588 1216 msedge.exe 85 PID 1216 wrote to memory of 3616 1216 msedge.exe 86 PID 1216 wrote to memory of 3616 1216 msedge.exe 86 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87 PID 1216 wrote to memory of 3500 1216 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\642922106a3ac72f4923de4b9f40858f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb275546f8,0x7ffb27554708,0x7ffb275547182⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4248 /prefetch:12⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,4665535449412431050,7517414793303753848,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:916
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
6KB
MD54c0d1116231190f68161e1f737538deb
SHA1f62ad52de7a1d4c4d67508c4aca37b00f66ef57d
SHA256d586f584534b535f79969cdbd96c710080ed53863517b5a27f0f5431689a8d22
SHA512b0e72d3abf23f46b6a8e08401e1281a6ca6b33d558a306910bbea0484c298b4c6f9a564d66b538c74da52a2726d4197bb803cf2eb96d8d3d36c79dacdaa6804e
-
Filesize
5KB
MD5867d14f06c9ab7d4327a26477d5eb03d
SHA152316467e931b92cb0c7abe2d706ffab2385ec22
SHA25663470797b85d2e90b40e84c7d5739c6e547086b0579671dc418e515fad4c66eb
SHA5129e98e5a0c4688577fecb994d8dbff8cf3c9c13d77fad6f475265b55d436b2c414fd0a9482ef2af551be8ef5a83fff47b10019a6681372a79ec4af54bd5ea1c19
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD529da35c4a92aa99783649f6504f1dfcd
SHA1aa12b501a131f4427c83ff4fc1260352e5aad673
SHA256fca563e1eceded4b88d38100ee735aa6f1007eb17f53b0d4c38c9e30328482a7
SHA512737729c3a631a612a5eb7030fe8a1872a197a442c334cc4467a9367a603c173c9d88086298b889194160168d692ebbb7b063fec7d91592157eee1b0729633e22