Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
72cc789ef094c5a201412a0027926b33_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
72cc789ef094c5a201412a0027926b33_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
72cc789ef094c5a201412a0027926b33_JaffaCakes118.html
-
Size
8KB
-
MD5
72cc789ef094c5a201412a0027926b33
-
SHA1
1553747ae1a1b915c7a3922101b70bdf05f93c61
-
SHA256
1746bd4c0cf036177cdf584da719b87a0c591d1d70d4a4c6e9471dfd55d738e9
-
SHA512
be1f0f7361cc2a59606543e26564defda13951086c50cabd3fc8336a2a47e09ea9a2d1eb744ba8c9eb8fbe8ff90b2a39a45eb7869e4e7fc4ca8992a7cb9c75fd
-
SSDEEP
96:uzVs+ux7B2LLY1k9o84d12ef7CSTUezfIneX8qH9ai+uNseijNi3ScEZ7ru7f:csz7B2AYS/ZvHSb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4408 msedge.exe 4408 msedge.exe 4384 identity_helper.exe 4384 identity_helper.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4408 wrote to memory of 3548 4408 msedge.exe 86 PID 4408 wrote to memory of 3548 4408 msedge.exe 86 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4768 4408 msedge.exe 87 PID 4408 wrote to memory of 4308 4408 msedge.exe 88 PID 4408 wrote to memory of 4308 4408 msedge.exe 88 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89 PID 4408 wrote to memory of 3400 4408 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\72cc789ef094c5a201412a0027926b33_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd0d146f8,0x7ffcd0d14708,0x7ffcd0d147182⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8229194423436023512,15543416804836676666,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,8229194423436023512,15543416804836676666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,8229194423436023512,15543416804836676666,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8229194423436023512,15543416804836676666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8229194423436023512,15543416804836676666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,8229194423436023512,15543416804836676666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,8229194423436023512,15543416804836676666,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8229194423436023512,15543416804836676666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8229194423436023512,15543416804836676666,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8229194423436023512,15543416804836676666,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8229194423436023512,15543416804836676666,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5576 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8229194423436023512,15543416804836676666,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
5KB
MD55026ad1b5544011d403daed4b9f0ee81
SHA1fd8898aecf06da1076d4bb4c90f75a88df51fb90
SHA2561f16846632cb64f27c469f3460b6a8558f5cfc69c2ff8255f7db0899a0d326c3
SHA51296dbcdcba4361f175e57f8770b13df7a5f6a7590b4ee111ef4bb9e0c1e4f7def7965b3e95c23bf41b87327d96c1417926674c26c6e875398c7c30130a435b7aa
-
Filesize
6KB
MD5236556e30b70afb2da7e490f0a209b6e
SHA133b46f00543c72375f2f64e5f455844170db5f73
SHA2563be7a726d21a1b29004e82bf83837162f307bc37edab3bdb94e4e705ee266861
SHA5129754bd5207ce2b84ae11d1cceb9b882a2370b2e00def9c6f7dcd8633df7a4d22bf8d7390857a84a761f142358d30c6accb9b192282acab87fb6904293d01091a
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
11KB
MD503b04b2fdf910363a41aa516c269dfa9
SHA1a501cb7cecd1e0a6c6654696d2d64d26a8aaebb0
SHA2564c8344ef1456cd763a9ef1cf4774f5f7576a157d96144a6f3e5dd155e91b6201
SHA512a69501c99ba2ca5a2c2842cc2ba4c2cda3159821e808dce01d99ecfdffa3bd6d47f600905ffb9baa6abceee9da9b724293e83ac36e2d8c39fb67517001bc43e4