Analysis
-
max time kernel
141s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 18:56
Static task
static1
Behavioral task
behavioral1
Sample
70d3c7359c21a95943c82204b4fb0f1b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
70d3c7359c21a95943c82204b4fb0f1b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
70d3c7359c21a95943c82204b4fb0f1b_JaffaCakes118.html
-
Size
145KB
-
MD5
70d3c7359c21a95943c82204b4fb0f1b
-
SHA1
ec2677f5603b557f4ff962e0f5934d9dc893ffa9
-
SHA256
5c73d3ddd355279e7b8fffaa8afafbfb754c15ad91fbeb23d352723d49d913c0
-
SHA512
590f48c31f8ce05028473386889e1751419443f519dcc546aa04710f85c7dd588ebb229e296f5d62ffac7a7a2142b3df5e48960c4dd8bd007170017a3ae32640
-
SSDEEP
1536:SfvxYQKzyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy+:SfUyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3620 msedge.exe 3620 msedge.exe 456 msedge.exe 456 msedge.exe 1332 identity_helper.exe 1332 identity_helper.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 456 wrote to memory of 3960 456 msedge.exe 84 PID 456 wrote to memory of 3960 456 msedge.exe 84 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3788 456 msedge.exe 85 PID 456 wrote to memory of 3620 456 msedge.exe 86 PID 456 wrote to memory of 3620 456 msedge.exe 86 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87 PID 456 wrote to memory of 3596 456 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\70d3c7359c21a95943c82204b4fb0f1b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7ffd24f546f8,0x7ffd24f54708,0x7ffd24f547182⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,7477018853741243173,13038169148848599043,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,7477018853741243173,13038169148848599043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,7477018853741243173,13038169148848599043,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7477018853741243173,13038169148848599043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7477018853741243173,13038169148848599043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,7477018853741243173,13038169148848599043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,7477018853741243173,13038169148848599043,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5968 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7477018853741243173,13038169148848599043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7477018853741243173,13038169148848599043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4748 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7477018853741243173,13038169148848599043,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3908 /prefetch:12⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7477018853741243173,13038169148848599043,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,7477018853741243173,13038169148848599043,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bafce9e4c53a0cb85310891b6b21791b
SHA15d70027cc137a7cbb38f5801b15fd97b05e89ee2
SHA25671fb546b5d2210a56e90b448ee10120cd92c518c8f79fb960f01b918f89f2b00
SHA512c0e4d3eccc0135ac92051539a18f64b8b8628cfe74e5b019d4f8e1dcbb51a9b49c486a1523885fe6be53da7118c013852e753c26a5490538c1e721fd0188836c
-
Filesize
152B
MD5a499254d6b5d91f97eb7a86e5f8ca573
SHA103dbfebfec8c94a9c06f9b0cd81ebe0a2b8be3d1
SHA256fb87b758c2b98989df851380293ff6786cb9a5cf2b3a384cec70d9f3eb064499
SHA512d7adcc76d0470bcd68d7644de3c8d2b6d61df8485979a4752ceea3df4d85bd1c290f72b3d8d5c8d639d5a10afa48d80e457f76b44dd8107ac97eb80fd98c7b0c
-
Filesize
183B
MD5a28fc8c7b408c9fec7eb29ba72319a1a
SHA12b1815d04fb077e076a7c078db984304b82cf50e
SHA2561d26a34f3b686ef9b0f4402fd77dbbf4e517c3a60d31f19751f038953abe9e65
SHA5126a6f10e0011b2e2f335d65b2b5da07e47e06aa5eeb22ac8950f63928c18242952d216526c8a2ba909ad04fdaf073215c4277272c6de2a28c7cb39a211f0a78bb
-
Filesize
5KB
MD53e58f6e6b29a698524a01a64d59d180b
SHA1a36a57e25c426052bf879f7e4f0ca9c2d6470fb3
SHA2564bd3cf7b67fc98576535c294399725bed416aa76f99a869ea13a810b39df93a3
SHA5129da435e31b59e75ce4e41c73ab2eff55759b684b343da750dcdbce0ebeb759b11cb83cfe371e1f021691a091afbad7650a22c0c64f0a32cd5d0c5576f2c68812
-
Filesize
6KB
MD5a83f64314ff43d742d206d5e6b73276e
SHA1b25262eafed2ce3aae71abb1c7c92c5995de8715
SHA2564055828e5d323e0cb657a0c341276370454d344e8737835d5df479d9632915d0
SHA51226da909913bdf7ddfc509be74e7cda8ad87d7b0fb9734e6a75630b961352e258624bd3ffabcc805aa41934b8ed96ea867a474303f692757f20ee156bf21a28b8
-
Filesize
6KB
MD582462a1f3c8609f72eea353573f7f9be
SHA1dfa4d7e4ccbc1a1696875ff524761d36a9ba3f84
SHA256bd7b17675c199a64f66e406185035b8891699b08de603da50f50687b44bb3ec0
SHA512b10de1965d508713c67a86f053a79e5221733e8504ec4f552dcb632da0cdcc2b25ec126b2a9eb1b09d8c4e57f9b019a1dc8619996a59472c18dcfd5ff5e8e756
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53273ac9646e4e3f85a21262111e75390
SHA1d2497d93b74dc512499a472dc6e211c1b1a324f6
SHA2560551e02a0334fa41cae3cb7f866f973b00b25b5a1ed055ac934624a12fa612bc
SHA5126f14523dcc7a954752da66ede9efbd0ec2db607a06781b0ca8f394eccbcf1bac0a7da71c4dbbbb66cd84c7cb95089dd531508182686ec43b634324db3a836c33