Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
71b6127e65b9bd7c471fbe1676c82b64_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
71b6127e65b9bd7c471fbe1676c82b64_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
71b6127e65b9bd7c471fbe1676c82b64_JaffaCakes118.html
-
Size
504B
-
MD5
71b6127e65b9bd7c471fbe1676c82b64
-
SHA1
3f254154f69feb2faf11cef67fb0dbb7346984e9
-
SHA256
6f336a4a121dd8a2cc1b67968f102ceb805126809653584feead228ff9de9ae8
-
SHA512
b232046a3a71a83245487edcfc4c098a665be5aea883aa4f298033dfdbbb28a7a04874eaa0f94e5dfc4f49bf22b9be5d303aa3c6991b0f41f3d4a799658b3b82
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3236 msedge.exe 3236 msedge.exe 2248 msedge.exe 2248 msedge.exe 2300 identity_helper.exe 2300 identity_helper.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 376 2248 msedge.exe 86 PID 2248 wrote to memory of 376 2248 msedge.exe 86 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3344 2248 msedge.exe 87 PID 2248 wrote to memory of 3236 2248 msedge.exe 88 PID 2248 wrote to memory of 3236 2248 msedge.exe 88 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89 PID 2248 wrote to memory of 2776 2248 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\71b6127e65b9bd7c471fbe1676c82b64_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e75546f8,0x7ff8e7554708,0x7ff8e75547182⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4964 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,9648934037893393770,4374123388455219929,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3844
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
6KB
MD5fe93619700fa71e2e41103b1207c4ca8
SHA189fe26d9a8479827139916016c5839afff3173fd
SHA256d8b46756f8e7e9bc4c279e25643159ad9991c25cc968ce0d99b7cf15f069d1cd
SHA512e062df6be5c573d0da23c14b669a271d4f90e112dc40b4a51a594910ff176767d761d79328aded2085b181e31da8ee25be72cb66a54450e00fb3f7a911e688bb
-
Filesize
5KB
MD53f48c96e89d1ea222eb18e02f2b76bbd
SHA1a458a995e26ad7896bb273ef7d53c2c71983872d
SHA256dcf9bd0cb1ed7b8dc30b794c89522b2b24554059c48594acb7f46b5f123a9235
SHA512b69876138c6b608496062e95f5c829c368cab28bc378749d2cd38c4726503da0907b32656cfec4a058449e6a65f4cc8f13d84f5a641ec1f0456e7962644476b4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e7c4221a4bfea00694cbb50197b8a120
SHA1587f22671c424b687a24d98516f3015c914d7d53
SHA25679160f43c68706322e4eb7be475a53c0b09620d2a5e074cb09ef6cef5bdd65ac
SHA512d6be736d1fb5e42803ea056b15825d0ecde936579b508d0f8e6239071e11eb016c2f1d2d70ddc2570ccfdaf757293ec02fd3e9df33ce9140f8caf7cae906f8dd