Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 22:58
Static task
static1
Behavioral task
behavioral1
Sample
71983d76f77152277e31062c17d06fe7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71983d76f77152277e31062c17d06fe7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
71983d76f77152277e31062c17d06fe7_JaffaCakes118.html
-
Size
53KB
-
MD5
71983d76f77152277e31062c17d06fe7
-
SHA1
198ee9b1936384270666a18dc224e07413371795
-
SHA256
13b4686d439bbe071e3cff104d952b08d39375bbf04cd56c78b8355f2eaaca74
-
SHA512
1043fc4b447eac2f2cacd96e1f12bb50578d09cd97f3342660c22d0048382746d6de8030f114083d0dfe12e94c64f04b3b5bf59b4a192bd8817b301dcd78d13c
-
SSDEEP
1536:CkgUiIakTqGivi+PyUNrunlYBo63Nj+q5VyvR0w2AzTICbbto68/t9M/dNwIUTDA:CkgUiIakTqGivi+PyUNrunlYC63Nj+qs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2168 msedge.exe 2168 msedge.exe 1140 msedge.exe 1140 msedge.exe 216 identity_helper.exe 216 identity_helper.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe 1140 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1140 wrote to memory of 4944 1140 msedge.exe 84 PID 1140 wrote to memory of 4944 1140 msedge.exe 84 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 4220 1140 msedge.exe 85 PID 1140 wrote to memory of 2168 1140 msedge.exe 86 PID 1140 wrote to memory of 2168 1140 msedge.exe 86 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87 PID 1140 wrote to memory of 4960 1140 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\71983d76f77152277e31062c17d06fe7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91d1546f8,0x7ff91d154708,0x7ff91d1547182⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2144 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5568 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5752 /prefetch:12⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,3414872976238523827,6350434526766440699,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:440
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
402B
MD5c9f89ee81435ff9e26f0801b783555b4
SHA1d6c06dbaf1a7431efcad16a9f0b8dda4e93e9cae
SHA2568417cc7579e04a1529e3384b396042e292db0c3cf00b87b632d731fb247bff70
SHA512cc3c74e2709581b5d080f8b830c9f649a79d78aa6f1b773c44b78deae900f6cab122c6305e0bd266f0961f8966b68de5780023c4c9d2f77a025d2567ce79d006
-
Filesize
5KB
MD5154d723d47b0ed6c985a9b8fc7776370
SHA17ce5430640629ecc98d0ab769910f27ac4f4ac7a
SHA25614e048332aaf6074d94f4e42ae33fea7ee36a8d497bfcf0c202307cbb8f20767
SHA512d683b9d7ebd2f36ec1086e91a2972ef5df3518aa598ac72466584ccd94f37e9ed002a9fdc9ac269dc15396ce612c009631f3fab4e3a6a14b6f589607e771e5fa
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f2029664-4a44-4d03-9ff5-7fbeb705683b.tmp
Filesize6KB
MD54614257dc35c7d3be9e5daeca46f1d56
SHA16071c69346721fe5a1eca5e891a6c88c2baa8d5f
SHA256a298d4e68910ae9fa87a09352a500813fc7e67330ff31fdb8255b0e51ca6f721
SHA5125d23a3fcd30a7e3cd40906998b7e52d17f3174a20c8e174d126559ea58bebbc2b063e0e2af5e546adc4f12ebf09a0140c70fa14d64e882bf5ca448712ee251b1
-
Filesize
11KB
MD518c11c32db2a6c511bd1477f21d0fe1c
SHA166245d1a76638970a9cef5dd294da82a6b590a73
SHA25698830a76265907c66577e063be72876a7883857b88dd99350577863d73072588
SHA512e8ec17257abff62b605863d94a63121ba2e80b94ae4aea0a9eb3023d0c02a0ef5c5cf2c698894ba5f0166c14727c696b17c94656d596bec27d896b59aefa5a77