Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 04:52
Static task
static1
Behavioral task
behavioral1
Sample
72a74b6d58ea5cfe36a4a908db6fec69_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
72a74b6d58ea5cfe36a4a908db6fec69_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
72a74b6d58ea5cfe36a4a908db6fec69_JaffaCakes118.html
-
Size
10KB
-
MD5
72a74b6d58ea5cfe36a4a908db6fec69
-
SHA1
57891b33105e2f168fa92b604e1b662b85c89b9d
-
SHA256
5a61060d4461ed09c8878c1b62f86a3fc83508882f3d49709013cfa636da5fed
-
SHA512
6cffbd516d10f1a88fa78a5a9eab121768b9fc536f14c1147d3f159169081b6f4ed0c3b6bdf2711fea9e58ad4daa37a1289dd5ddf3684eae983954c2feb6c939
-
SSDEEP
96:uzVs+ux7uBfLLY1k9o84d12ef7CSTUcGT/klkympH13x3TaclVHcEZ7ru7f:csz7uBfAYS/VlP8JPHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3608 msedge.exe 3608 msedge.exe 3296 msedge.exe 3296 msedge.exe 2676 identity_helper.exe 2676 identity_helper.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe 3296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3296 wrote to memory of 4924 3296 msedge.exe 84 PID 3296 wrote to memory of 4924 3296 msedge.exe 84 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 4152 3296 msedge.exe 85 PID 3296 wrote to memory of 3608 3296 msedge.exe 86 PID 3296 wrote to memory of 3608 3296 msedge.exe 86 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87 PID 3296 wrote to memory of 2156 3296 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\72a74b6d58ea5cfe36a4a908db6fec69_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff952d746f8,0x7ff952d74708,0x7ff952d747182⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12551377525164641647,12839563748852679506,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,12551377525164641647,12839563748852679506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,12551377525164641647,12839563748852679506,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12551377525164641647,12839563748852679506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12551377525164641647,12839563748852679506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12551377525164641647,12839563748852679506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,12551377525164641647,12839563748852679506,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5132 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12551377525164641647,12839563748852679506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12551377525164641647,12839563748852679506,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12551377525164641647,12839563748852679506,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,12551377525164641647,12839563748852679506,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5524 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,12551377525164641647,12839563748852679506,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3772 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3448
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\30e5e6f6-536c-418c-88ab-0c85f8bea4a7.tmp
Filesize5KB
MD596904fedcd563c39d2b518d19f2a9590
SHA10cc5ca9065168a035e4dec8c5f10a917ccf622bf
SHA25603c5a04b44bcd1251adaf07aa8c5ad3b0c7f36b0e6aa46d30a1093978b364fa4
SHA5122cf95d0f9eb44fe89979fa0e8f65821d43a9842ae8237867c673a33f799b44d14931370e67c755a41acd299523ba9ae72373fbdb107659c28f3decbdc9fcde79
-
Filesize
6KB
MD5cc492aa4f10a04eecdceeb0a52028fcb
SHA12b771748231e30d0426c2fdf866ab2db004e799c
SHA256a02ab9a823d4dfc6430187a4eec320637ec3c9837e456ad4618730fd08c132cd
SHA51203f35079943345a44b108055a49b37bd0cabd1cf955885878b8f0650440424bb4cfa5f2660e684352c6f8ba3bc50cb6a0e49d32fe7d08bba1c7f4df85fff37d9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5376292796c9556735519e601fca480b1
SHA1eb7ce4453d0857a384869bb490cbc0311218ce9f
SHA2565aedaab0698548bf541fa83c8cf9c140581ad30ddece398896e190529bfb1b2c
SHA51239cef938b27ba0743a940a3cbd65b5dd4278f94e67a00038c747d92916f33b83351cdb21cf221039e6035270b2794bafa438b49fead2620104be04a274508bdb