Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
71f0f66f2b36c7dadc55cd77bea32a67_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
71f0f66f2b36c7dadc55cd77bea32a67_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
71f0f66f2b36c7dadc55cd77bea32a67_JaffaCakes118.html
-
Size
75KB
-
MD5
71f0f66f2b36c7dadc55cd77bea32a67
-
SHA1
dccdc4e72dc054666a1c9a48cbc31616094541e1
-
SHA256
95a0e2a9ed03988dc8f1ab6b39f3ea60f21a1b8cf1e84511863f73af96e20eb1
-
SHA512
cbc2363f14dddacda0a88e754bedfa94006ac6a44d04e8bb806be6f5219ca94748ec4f97c263600da5da5f699625032958b2e289615b61f784758021700243dc
-
SSDEEP
768:P0JFC3HpeKBPmAINRDJ4ZjFp+W1NRre7mAn1UmUoAhrUDVar2kjneqs+XhOhjlrW:t3H5d8DGzIwNRWmrPl6Em9+p
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3412 msedge.exe 3412 msedge.exe 4092 msedge.exe 4092 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe 1256 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe 4092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4092 wrote to memory of 3392 4092 msedge.exe 84 PID 4092 wrote to memory of 3392 4092 msedge.exe 84 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 4448 4092 msedge.exe 85 PID 4092 wrote to memory of 3412 4092 msedge.exe 86 PID 4092 wrote to memory of 3412 4092 msedge.exe 86 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87 PID 4092 wrote to memory of 900 4092 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\71f0f66f2b36c7dadc55cd77bea32a67_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb594b46f8,0x7ffb594b4708,0x7ffb594b47182⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14267171040032293307,8297127876213316238,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,14267171040032293307,8297127876213316238,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,14267171040032293307,8297127876213316238,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14267171040032293307,8297127876213316238,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,14267171040032293307,8297127876213316238,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,14267171040032293307,8297127876213316238,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3156 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1256
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d406f3135e11b0a0829109c1090a41dc
SHA1810f00e803c17274f9af074fc6c47849ad6e873e
SHA25691f57909a10174b06c862089a9c1f3b3aeafea74a70ee1942ce11bb80d9eace4
SHA5122b9f0f94b1e8a1b62ab38af8df2add0ec9e4c6dfa94d9c84cc24fe86d2d57d4fc0d9ec8a9775cf42a859ddfd130260128185a0e2588992bca8fd4ebf5ee6d409
-
Filesize
152B
MD57f37f119665df6beaa925337bbff0e84
SHA1c2601d11f8aa77e12ab3508479cbf20c27cbd865
SHA2561073dbff3ec315ac85361c35c8ba791cc4198149b097c7b287dda1d791925027
SHA5128e180e41dd27c51e81788564b19b8ff411028890da506fbf767d394b1e73ec53e046c8d07235b2ec7c1c593c976bbf74ed9b7d442d68b526a0a77a9b5b0ab817
-
Filesize
5KB
MD5b400257e3a5777427a5983663fda0d5f
SHA1486665f4aeeab4f700508b4b0fd0f38a740ab0a7
SHA25614adf0685bc84e4114e94039ec9978c1b249d46de2500664ef5b085824ced012
SHA5125f009d6b20ff940ee2254247b34d1cbf2a288ff0ce2f051d80afc578f7a464c80bea442a1b39e197b426f9f241b495a28054b4b9587d50095193a4829d0ed93e
-
Filesize
6KB
MD54c3b7ba13ae941456f86556e6fc93bd6
SHA1b69513917cc6ad0451c2525f807835355a1f7323
SHA256ce9d9a02446cf48afcc4b219e4bdab85bb5f138223e38bb9d5853d26d9c447f7
SHA512bc7a2722c67388123e1ea98c1f94c9da0ed7f3184b7888634e35fdc3d60774dbe5bd4bf725bc4ce80302aa051477dc76414ca5f1fed0bfb8b626972937ecb841
-
Filesize
10KB
MD58da55d320db0d4f1fa408c6612bc8d4e
SHA173b19c4d31d85aa880b7ed553c4235babb791cae
SHA2560d51b2eafca59f22c9090f6fa7ed1fc9e2fd77318ced673f09bcbf67fd05a5be
SHA5127f4c76350a11e5f541004e7cba0e24bbf4074c0c8bea459d7c1b3f8826f01ab51f4c7340439a8047716a3437432d9319f872ccc95d925bea10e320fac86d6550