Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
65d1dea7a14e4ff1a398d8af1491d3d2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
65d1dea7a14e4ff1a398d8af1491d3d2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
65d1dea7a14e4ff1a398d8af1491d3d2_JaffaCakes118.html
-
Size
91KB
-
MD5
65d1dea7a14e4ff1a398d8af1491d3d2
-
SHA1
820aff43f850e875945ca7d277469d87c065d0cc
-
SHA256
f3653851560c812b832754e12190651af0dca8954c14e3e81c4685d88e49e28c
-
SHA512
e7875f6f0a824a89e59570458979af2d53eecac6877ce13e49a3f677a56381748a97d8be898b621720f86037c2b94e52b87d891c3897f31a42168108e917a690
-
SSDEEP
1536:txJJwZtG5/jLit5pP/FGZa0ILLCiF0JJHiGZdqyB5NXCqlt+Vc7Uw0Q8Ogjj:txEZti/ja4ZPDiFbGZdqyLNyoYcVlu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 4836 msedge.exe 4836 msedge.exe 1988 identity_helper.exe 1988 identity_helper.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe 1468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4836 wrote to memory of 3808 4836 msedge.exe 86 PID 4836 wrote to memory of 3808 4836 msedge.exe 86 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 4404 4836 msedge.exe 87 PID 4836 wrote to memory of 1832 4836 msedge.exe 88 PID 4836 wrote to memory of 1832 4836 msedge.exe 88 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89 PID 4836 wrote to memory of 3688 4836 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\65d1dea7a14e4ff1a398d8af1491d3d2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff952d746f8,0x7ff952d74708,0x7ff952d747182⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,12762215561615907721,12256938533063169674,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1460
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
5KB
MD5c57b8dba007c6f439a26fe2c8b79804a
SHA18e3eaddd13a08d1b4e6148f0e92ddf261e4f1441
SHA256f8f7b4467bf8874bf965de80999a1be6b3a8894403e4df6929e4015f58e4d045
SHA512f25ebbabd9e9b6ae4a31fdabfa765e3c1f86c8e8021345150aea582bb463fc7687e9dc65a524e705bef13df73691e0d08fc48ea16efb7212cc035f734253efb8
-
Filesize
6KB
MD5f4be941cf01aea51fc1c34ceadcad89c
SHA1411cf708dfe329139a1b5758483a4d4e44dcd3e1
SHA256ea37cb8aa0b476830fff7cbfd9c83eef50f9bc9e57271fa33c679b4f919f5d33
SHA512d7672a67e586b88fb75e9cde0e94795c6f9bff19fe6f92153b01b18703e6de9018576abb0d73930b8b03e29bca54d964ee22304d3215627876b7d2b9890f2961
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5612df59b4b6c19a390a771b76a2c8231
SHA1e27359ad9e1df686c462809709c06ecef0897659
SHA256d6bd47f93eae437aae8db0c76fdc4155c4c222bcdcf84cf0a935bdf6c54b95c4
SHA51205efe1684d9044d1756db9ae9cfabfbcbdffe2e43306df125afd88ee1d6056d374541b381358e2843fef38c632051bb5caf481dc87fe1aba552ce00efd170e7f