Analysis
-
max time kernel
146s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 23:58
Static task
static1
Behavioral task
behavioral1
Sample
76483e035afad043c0dfba4fc6e1e61b_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
76483e035afad043c0dfba4fc6e1e61b_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
76483e035afad043c0dfba4fc6e1e61b_JaffaCakes118.html
-
Size
53KB
-
MD5
76483e035afad043c0dfba4fc6e1e61b
-
SHA1
716147f3d17b259569eb123467b20b0bb15c7439
-
SHA256
14fe04582196062acb4b2496f4a997ebb12ce79ee6439bd1e5c283ab642262c5
-
SHA512
f2cacbe088b0a1baf029a4f5e9ab4fd3ad3548dac09cbedc7e11d438f1983c1fead2caf35f42126da2605334cb0f599050c1fe61dc89a9b69eaa5907973107fe
-
SSDEEP
1536:CkgUiIakTqGivi+PyUrrunlYu63Nj+q5VyvR0w2AzTICbbBoX/t9M/dNwIUTDmDQ:CkgUiIakTqGivi+PyUrrunlYu63Nj+qB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 448 msedge.exe 448 msedge.exe 2512 msedge.exe 2512 msedge.exe 4824 identity_helper.exe 4824 identity_helper.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe 1856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe 2512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2512 wrote to memory of 436 2512 msedge.exe 84 PID 2512 wrote to memory of 436 2512 msedge.exe 84 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 2132 2512 msedge.exe 85 PID 2512 wrote to memory of 448 2512 msedge.exe 86 PID 2512 wrote to memory of 448 2512 msedge.exe 86 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87 PID 2512 wrote to memory of 1192 2512 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\76483e035afad043c0dfba4fc6e1e61b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ff8a63f46f8,0x7ff8a63f4708,0x7ff8a63f47182⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2740 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:1116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6048 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5932 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,4182978112948688069,11610753251220076180,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1952 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3452
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
343B
MD5644b5f33822943ecf4088ff9e2c84e12
SHA10af422e1b4375a7559729f2460a870730def5ad8
SHA256533f38c30fbf8bba65159978dd53f82e5f8d6d2d031931791dc11784865a2596
SHA512173c960b97cb5010a31c9bd44003122c445314e021ce7a38ec3e863f7d1311bc71ac8aae99403fa0bde381cb2ebb7c24c80232876c3dd1484ef5c39d9e536f3b
-
Filesize
5KB
MD541273f0689e33488304684e26019b300
SHA19aebc3bc3cb220a62181e428ffb92fd1f4a63651
SHA25669d6116d313bf3a555961fb87b6253fbe54fe4732c2555e7e8ee94c4c6403e8c
SHA512d36dc6a920a7567e07c9ddb044603c99a88481371742106eb9cbe2c35c1bccc430a657c3efe8bc61c18eea49f2c0e6145866db5de89201b7b9625c34700c3d47
-
Filesize
6KB
MD52d408da3a072a34ac09f7ebb9278b8cd
SHA19091b4b56fefeb106b3468f6688360c74b453987
SHA256f1a080cb5d37a43ce890ae3c4c343dcef5683551a78a91bcd6b2fddc87a78cf7
SHA5120562de57d6a4a21da0f946ee2e37da8d72a6a00e0939304bcb53c7eddf6d346c643692f5b0eb6c3f2cac3335689fb9d6fa36279242f2bb75fa3e607980c6a922
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e6f059e097d7a4ceebf614fb92434bd5
SHA17d38fc2bdd9c14f772dd3889111535475f35d386
SHA256b2395384b1edf9becbc1a19ecfd4c5bc07d62b8783c2a47be6bbc43d7ede37a3
SHA51251c59762805ae97a75f6ec53cbfb5c135b1dab25a7a3e1c7d52aadc2e2e0e10157f36e1bfdad4fe85fc0429062128160be1df4283d82f28725d14588a7fd53fb