Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
66136f2897f0d01bf7c075f4ab01e443_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
66136f2897f0d01bf7c075f4ab01e443_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
66136f2897f0d01bf7c075f4ab01e443_JaffaCakes118.html
-
Size
186KB
-
MD5
66136f2897f0d01bf7c075f4ab01e443
-
SHA1
0e959629e825dd8822763db08c367b5a8f96edac
-
SHA256
6238b4f0cf40f56484a9764c4fe0de9a0f987dbc10b4ae196e77812580ce6951
-
SHA512
bdc47fcdcc419c15fe634614807064feab4f0b51732bc94726e8bb8585144360b672cac2dba8b3fb1174ad99041b9bbc7dfa04a39d1ac451ef2c18a54f49b9a0
-
SSDEEP
3072:NRyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:NUsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 704 msedge.exe 704 msedge.exe 4728 msedge.exe 4728 msedge.exe 2696 identity_helper.exe 2696 identity_helper.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe 3016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4728 wrote to memory of 4824 4728 msedge.exe 86 PID 4728 wrote to memory of 4824 4728 msedge.exe 86 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 2632 4728 msedge.exe 87 PID 4728 wrote to memory of 704 4728 msedge.exe 88 PID 4728 wrote to memory of 704 4728 msedge.exe 88 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89 PID 4728 wrote to memory of 3460 4728 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\66136f2897f0d01bf7c075f4ab01e443_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe324046f8,0x7ffe32404708,0x7ffe324047182⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17562683112638360262,7317618048906581960,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,17562683112638360262,7317618048906581960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,17562683112638360262,7317618048906581960,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17562683112638360262,7317618048906581960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17562683112638360262,7317618048906581960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17562683112638360262,7317618048906581960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,17562683112638360262,7317618048906581960,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17562683112638360262,7317618048906581960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17562683112638360262,7317618048906581960,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17562683112638360262,7317618048906581960,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5732 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,17562683112638360262,7317618048906581960,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:1500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,17562683112638360262,7317618048906581960,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5316 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
6KB
MD5ed9d7e22a582ff56e4393853723c9473
SHA11f573a6c2c86cb8e331d2a5111e85cde71a9e0b1
SHA25619af6fdb6807daad14794bfab14478e70f5f5a21449da2932ba65d29d3f93d3d
SHA512b539229839b197b89a0aa6f478a1aa5d87bff89a1ca27da588e5006fbd0dd632ddcb4f2fcd4a04edc9d580e5752dd18276f664bc5bb98f96b8e257c3c3b6e713
-
Filesize
5KB
MD5453e039a6ea499e770dc4474eece4f33
SHA13f5de9b982a326d83a921e41240fb3968b5bfef5
SHA25637a1ccf7a597c3142424a7b7feeafc0582cefe6adc5f803acc3ea3a68e1da065
SHA5123552eaac382eeabbd88c5b5a8cf65feae55c0d215212371d36164a3a137f8898707ed957679d278b9f31bc7cf1a4d7051ee11209b8be1c2d0c03641f65177234
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5177408726028fd9fcf4a629045239a42
SHA1b4c0d83f1453f8ee54528af78bc22a5535e3c236
SHA256e6ba17a71b64173b3fff8d9ab09c9e9949b3f72b009790cd801cf00fa90d6600
SHA5120180b49857d5a0d580e813a880878e185a16c630d5976ee4a30aead422e2db1609f996aacfb1be5acb3636fee880e569a052381412ad817674a90016eb0b9e6f