Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 23:52
Static task
static1
Behavioral task
behavioral1
Sample
76441aab270456046fa9809a91b73e09_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
76441aab270456046fa9809a91b73e09_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
76441aab270456046fa9809a91b73e09_JaffaCakes118.html
-
Size
53KB
-
MD5
76441aab270456046fa9809a91b73e09
-
SHA1
d05e332fc7c11910e82ef0ce601c4e0853b16862
-
SHA256
c834203afa71396cf30312e799377807559b6ae4ceb81dc44a4083ba53a5df0e
-
SHA512
9124e8ce1c7cddf5691b90db85608886c458eaf923bba4a8ecfbbfc6fe7f9e7dc527e14050ee2b041cab21e471674fb10132cbbff94cdca800533dada299a8b8
-
SSDEEP
1536:CkgUiIakTqGivi+PyURrunlY363Nj+q5VyvR0w2AzTICbbyog/t9M/dNwIUTDmDM:CkgUiIakTqGivi+PyURrunlY363Nj+qN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3248 msedge.exe 3248 msedge.exe 1644 msedge.exe 1644 msedge.exe 2800 identity_helper.exe 2800 identity_helper.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe 4640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 584 1644 msedge.exe 84 PID 1644 wrote to memory of 584 1644 msedge.exe 84 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 2628 1644 msedge.exe 85 PID 1644 wrote to memory of 3248 1644 msedge.exe 86 PID 1644 wrote to memory of 3248 1644 msedge.exe 86 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87 PID 1644 wrote to memory of 2344 1644 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\76441aab270456046fa9809a91b73e09_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa12046f8,0x7ffaa1204708,0x7ffaa12047182⤵PID:584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5612 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,1792901973483960298,1784168140130658987,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
402B
MD5b54504ad7de411583c3313b4b9bd2e9d
SHA16c570bd6032ccc57dec01f4f50436a1ff3a08bf4
SHA256d42b8b03078e934f6380cb1e46735342ce7162a27b871b52c60d9b9383755871
SHA5121be10fc7ec3686406c81de45e50db109cea6ccd816285d5bc3ff25c9501cceabc2a03dfcb67bfd0e48929724687d80c7383894268d980db78f45d4d019a6770d
-
Filesize
5KB
MD53013d0c27d5b4685e6640ba07885efab
SHA1d6d9d535f40bb646c99d9d50375b2561236371d2
SHA2562240a71e5d9e511fa7f5118c47aac697580ec9f88d5a591ad20d0f2554a89b74
SHA512b9cbc9ba89dac22ccac0c2fa420838cba35e4061077e25d17f46507547a90e938ee71335ab3c901439c47cb39e6fe44d3d31aefd78303a6b4e5df1b70fed3d8c
-
Filesize
6KB
MD54bcd1f454415079b202638be50d640c6
SHA119d8c1646bf30513609ba15ea970c6d593eea10b
SHA256afbbe8fd8799b6fb301941e9e43b2d6065b39501c01b79b6edfa679d1a56ebc7
SHA5120dde44c3d634a9854decff5a472f53b2a0649563eb3e854fdf21b128cb34aaaa3aed4877cdd258de04daaded6ee08a6f23b69b7edfd13f8ab1f3fcfbba6fa098
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5ccc18a7873f7d96c879784a0113c0a6b
SHA19301a6479aa302ef519d7d39fb4c5a86bdafc263
SHA25657a4b8c2039b164c630f2441896d4699d6344a589b74c1ce24bdcb2e6b9e1a29
SHA512aea7fbfee3826bf26369d6b375401640eca5f748cacd51f7179bd3789d641a2675c6d05ef7b1bed64477051f6890290a8188a0a1dab37cf1f14317af7cc70159