Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 02:24
Static task
static1
Behavioral task
behavioral1
Sample
723db5deff6f34014ae2a97795dce5e2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
723db5deff6f34014ae2a97795dce5e2_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
723db5deff6f34014ae2a97795dce5e2_JaffaCakes118.html
-
Size
91KB
-
MD5
723db5deff6f34014ae2a97795dce5e2
-
SHA1
51fb067149c23a2a79f104559debb924f4adc375
-
SHA256
93c4aab200d67a37ab77e6ce4ff563ffbf7965d8643a8979cbcfbab45f35bbcc
-
SHA512
c5ff7c6a18007d8223371b12f92b5ecb52b299cb04e78fe63e9ecc0d608f1c77d2f1bff03352f0e9f9497b780f0526113f5bbeb5df011c91e4f219746edac7fe
-
SSDEEP
1536:Zdo9KdRAnu5DWE3i8i1/oe/l8+uyH/joYLTAN45hATJSYTJSZM4Gjnvlr13dM:ZhdU6330B3RYxbh5W
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 736 msedge.exe 736 msedge.exe 3164 identity_helper.exe 3164 identity_helper.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe 3384 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe 736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 736 wrote to memory of 1876 736 msedge.exe 84 PID 736 wrote to memory of 1876 736 msedge.exe 84 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 3264 736 msedge.exe 85 PID 736 wrote to memory of 4344 736 msedge.exe 86 PID 736 wrote to memory of 4344 736 msedge.exe 86 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87 PID 736 wrote to memory of 2528 736 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\723db5deff6f34014ae2a97795dce5e2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc2bd446f8,0x7ffc2bd44708,0x7ffc2bd447182⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2124 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,12323020793988568038,17165622449676222332,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
5KB
MD515a7a8e2b63ef0ff8f38cfe004d79a4c
SHA1c37b1f79b2001dfb87445aa694a4d5431adbea03
SHA256114a30eb7b2f3ea14d152334db7ea579ae85d3d32507123fa3c5ed2aeecbaf26
SHA5123a3755f60f6b6665e2deb237f042ddd038a7d2ef9e761b9881039426498e62db953fe87592f161338fdbc02122964e555f4b31d966911881ef59facaefce857f
-
Filesize
6KB
MD555c85c2892f49b5437168a6cf5cd1f18
SHA14a1a4e28e17f5046743a9a2937eaaee0237f782f
SHA2562704a09c7fc22f43e47d33fd76fc2b5d7c0d89b475a7700912f6d6b849d12497
SHA512b656c8ce00255b7845588b234c125cdcc94b39e120d187ad5699a3e225184dbffc501dfaf45ee0fcf8a5bc8a18edc91c93b82128997a61dbdd554a4335509d11
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD5afced39c641ae2aa3ebf54bde9abd051
SHA17f7e8132f5fdc24e78b89847b3ecf96f7658abd6
SHA256510f864e7191053405f4ec2b667f1eb92acc1140f2775426e5d02b98cebc4948
SHA5127740ed48cba25a40ca3ec8409437703e873b468e3e5a32a483eef7ddfb34e65cec98df2a6c9d4db989437cc74156d2e7916497e55d84e68d9929552e939cee07