Analysis
-
max time kernel
146s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
745b166c2b279e21fd5b70e26bd2fab7_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
745b166c2b279e21fd5b70e26bd2fab7_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
745b166c2b279e21fd5b70e26bd2fab7_JaffaCakes118.html
-
Size
14KB
-
MD5
745b166c2b279e21fd5b70e26bd2fab7
-
SHA1
555ffb9c989471bab47aa3ee32603d135e01149a
-
SHA256
47e28f804605cc25ea04f772cc6fb6a24f3c2ff54ab89e301dfde97cb043078f
-
SHA512
7ba4f6da4671da71707faf4f520d24732854c59997ece6415ad9ce0481511e0da25246dbf2ef8672440d919b188a4db903fe81abe6c5bbb8ba5cb00056b37c86
-
SSDEEP
192:Od6qYNPMMnIooSGI/idP8EigKbqjY73WuNpx8ikiuNphVa6eyS8:OMxdiiLqchehVa668
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 924 msedge.exe 924 msedge.exe 4960 msedge.exe 4960 msedge.exe 2204 identity_helper.exe 2204 identity_helper.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe 1676 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe 4960 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4960 wrote to memory of 4428 4960 msedge.exe 84 PID 4960 wrote to memory of 4428 4960 msedge.exe 84 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 2584 4960 msedge.exe 85 PID 4960 wrote to memory of 924 4960 msedge.exe 86 PID 4960 wrote to memory of 924 4960 msedge.exe 86 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87 PID 4960 wrote to memory of 4840 4960 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\745b166c2b279e21fd5b70e26bd2fab7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a87346f8,0x7ff9a8734708,0x7ff9a87347182⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3112 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4636 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5916 /prefetch:12⤵PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4744 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3808 /prefetch:12⤵PID:972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5852 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,218186234916472171,11870216520132511599,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3028 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD504b60a51907d399f3685e03094b603cb
SHA1228d18888782f4e66ca207c1a073560e0a4cc6e7
SHA25687a9d9f1bd99313295b2ce703580b9d37c3a68b9b33026fdda4c2530f562e6a3
SHA5122a8e3da94eaf0a6c4a2f29da6fec2796ba6a13cad6425bb650349a60eb3204643fc2fd1ab425f0251610cb9cce65e7dba459388b4e00c12ba3434a1798855c91
-
Filesize
152B
MD59622e603d436ca747f3a4407a6ca952e
SHA1297d9aed5337a8a7290ea436b61458c372b1d497
SHA256ace0e47e358fba0831b508cd23949a503ae0e6a5c857859e720d1b6479ff2261
SHA512f774c5c44f0fcdfb45847626f6808076dccabfbcb8a37d00329ec792e2901dc59636ef15c95d84d0080272571542d43b473ce11c2209ac251bee13bd611b200a
-
Filesize
5KB
MD5634da5ea15d1153d0d079ba246c36f31
SHA1ed3faff52005bc31556bb564c923e4da0b3ce618
SHA256b342a052f3b4256025d1d1f211c415c20878ad34b80444b3e94e0cb05ea63de6
SHA5121f73a39cd5f887f46797488acd3b0cdc818f343df24700313dddaf6bfc05ba025cd7aa38b984291ce4b8731bb7ac0deb73142ae88b5cbf9334e7d834f5d253f5
-
Filesize
6KB
MD5939e8fd293b452243a2e4b491893adb4
SHA1421ba0e9a17e3f118356ebfbe2a4d259917d30fe
SHA256d3a387ab8f813f5cf14aba050c187aa2dbe2f5a4eac643e805057d6acaff9342
SHA51251ce0ab5d3b0a4dafc9780854529c5db3a1417d2ffecfdefd93895861f3e0ff344bc3fa122b2f95aa4e3447d0a71ebae25ead34de6e7a6bb254821827d1a12ab
-
Filesize
6KB
MD5405b1df07f378596d40418481adceabb
SHA14fff081d0915b923c0136cefece16051297ab1eb
SHA256b8504d8828cbd7eee0a60c13090751d8d2a46c654e85a6eec8cb2405bb6f032e
SHA5122ff87d9d78a923f893cb96b266169a7b8d4d163d9d32eb39ff0ca0070375ba80e7efed4964154da9ff05275175cecea28823508105968d650267e972eb5e05f5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD56e5c3ef5d4e91405639907b0b1d55b09
SHA1d1ac8a9e0e486a44b2491f92a220b1c1aecad868
SHA256b762dd1c31959aaf3c5ba1172263c23ee6efacea5e1d9f1f6adf498fabcd6592
SHA512ce5ce4e69780177e19d0d793a3659c2e608cd59c58309f3ff1ab5f59c7d8f942adaf96d81a9c0769fc714e5593f2469fbeff0ecb1cdfca5e6357e926bf8fa27b