Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23-07-2024 12:50
Static task
static1
Behavioral task
behavioral1
Sample
67a9fd3d41f2ac5cf2704095ea846b59_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
67a9fd3d41f2ac5cf2704095ea846b59_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
67a9fd3d41f2ac5cf2704095ea846b59_JaffaCakes118.html
-
Size
11KB
-
MD5
67a9fd3d41f2ac5cf2704095ea846b59
-
SHA1
2effcf088a0dc5858ba908701c2d6c4a471ea470
-
SHA256
f18f8648d6298083c07c02293ba99e8c2c7e9c260e77b2364db9df65f2b0eac9
-
SHA512
8fda16cf0f650ed4ba57fe15c2a7fbd3c47249af297790ac44eb1889a1b6e1d0ce31729279a834b4b2e64b967cc58e1ae493bfd001285d1b047da283670d4854
-
SSDEEP
96:uzVs+ux7yLtLLY1k9o84d12ef7CSTUBGT/k1+pEooYPiTe4nsjuFsrlVHcEZ7rur:csz7yLtAYS/I2nATeau88PHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1540 msedge.exe 1540 msedge.exe 4592 msedge.exe 4592 msedge.exe 3408 identity_helper.exe 3408 identity_helper.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe 4592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4592 wrote to memory of 3624 4592 msedge.exe 86 PID 4592 wrote to memory of 3624 4592 msedge.exe 86 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 3492 4592 msedge.exe 87 PID 4592 wrote to memory of 1540 4592 msedge.exe 88 PID 4592 wrote to memory of 1540 4592 msedge.exe 88 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89 PID 4592 wrote to memory of 1036 4592 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\67a9fd3d41f2ac5cf2704095ea846b59_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd580646f8,0x7ffd58064708,0x7ffd580647182⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,5746507263453772768,13307573905800852840,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,5746507263453772768,13307573905800852840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,5746507263453772768,13307573905800852840,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2512 /prefetch:82⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5746507263453772768,13307573905800852840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5746507263453772768,13307573905800852840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,5746507263453772768,13307573905800852840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,5746507263453772768,13307573905800852840,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5746507263453772768,13307573905800852840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5746507263453772768,13307573905800852840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4712 /prefetch:12⤵PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5746507263453772768,13307573905800852840,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,5746507263453772768,13307573905800852840,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,5746507263453772768,13307573905800852840,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4056
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:312
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
5KB
MD5577db80e01025aaccff106c0dae6e957
SHA15cf0ee1c7b37cb9b09f95a85d54700e122081fb4
SHA2562fa346b57a70d85e10eaf5170eee652193a63af78d2dfcb6a681d99fd60a1ae0
SHA5120e8d2600c3f4c0f36792623c425fdf47f79d75336b5106ccae1c57319429953b690cfea12722286f0fa3029b5f4e7c32099182b262d0d0ca04558486e34d1c7b
-
Filesize
6KB
MD59b1b406ec216a7dff9b69aa11ddb7dbd
SHA15c668c07e8ef57143a23b3687e47eeb761d15f8e
SHA256d8eef7c338a2f39c542c3f3e0ab6be2ef16568fec8012de5ddf079f11eb63abd
SHA5127383c853fcbd37ca29679c232ce539d619bd423889fb86c44cad9b0bfb4ad84251dc7b4687315f46d80341d5010010aef063760fd0b188e87b40360dba9818ab
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5452f0eb06e7bf8ed03b86e47acca7f9f
SHA1c668385f1824af8867ecf6d5c11b0a6800ed5344
SHA25655f56b557bdc5a5fff9d77f18b572de5afe1abf0a4abd3392515d6d1f6330980
SHA5125edd3dcadb4cc60ebd6ee1aa83618466101c737942bd9ebb1b2b1971dcbb2119e7d506ddaa034619b8a74511634d8a2ac4966a301a7adb8c11fae5e4e6c594cc