Analysis
-
max time kernel
145s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
755f8c22b57551da0b4afb7c60a2653d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
755f8c22b57551da0b4afb7c60a2653d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
755f8c22b57551da0b4afb7c60a2653d_JaffaCakes118.html
-
Size
6KB
-
MD5
755f8c22b57551da0b4afb7c60a2653d
-
SHA1
de12e020c4e8188c888d7ff5d214ba53716adb20
-
SHA256
964e8c16edf9e6b7265ab929d7e96aee3d4f134a720cc6eb6dfca34f8f2c5704
-
SHA512
3f0fd9b1efc04c469bda9ee2b7fbce22d345ee2540c1b53fbe4e36a7c3689bd84089618dd41854eecd78e8acb8bd8fcf010fba7759bc84e3dc2ed099565495c4
-
SSDEEP
96:uzVs+ux7r9LLY1k9o84d12ef7CSTUSZcEZ7ru7f:csz7r9AYS/Rb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2672 msedge.exe 2672 msedge.exe 4248 msedge.exe 4248 msedge.exe 4132 identity_helper.exe 4132 identity_helper.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe 4352 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe 4248 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4248 wrote to memory of 3448 4248 msedge.exe 84 PID 4248 wrote to memory of 3448 4248 msedge.exe 84 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 1764 4248 msedge.exe 85 PID 4248 wrote to memory of 2672 4248 msedge.exe 86 PID 4248 wrote to memory of 2672 4248 msedge.exe 86 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87 PID 4248 wrote to memory of 1420 4248 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\755f8c22b57551da0b4afb7c60a2653d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8461446f8,0x7ff846144708,0x7ff8461447182⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3678963527213649798,1142574379421200668,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,3678963527213649798,1142574379421200668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,3678963527213649798,1142574379421200668,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3678963527213649798,1142574379421200668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3678963527213649798,1142574379421200668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,3678963527213649798,1142574379421200668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,3678963527213649798,1142574379421200668,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3678963527213649798,1142574379421200668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3678963527213649798,1142574379421200668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3678963527213649798,1142574379421200668,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,3678963527213649798,1142574379421200668,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,3678963527213649798,1142574379421200668,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1796 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
5KB
MD55fe100692744fa7e90b48f04799cfab2
SHA1674940e25e15bf2e812c4a91e77fb6d2fdb90ce0
SHA256e06a12d68cc2d68e7f2e2cbd153f5d38ee6aa1b19f7054bd6ea34a85a406f42b
SHA5123f27cf3617c7bb4d78fdc187f20c26888791e89d93eb55e93e8ba479a5ea27438fd8f1f9fa612eae0de9dddd932dbd4968929c2b0889bbf483ff19a83bc6768b
-
Filesize
6KB
MD52da067a92b8b94294d4f89de9678e079
SHA116c02773e67fc9b1b1372d167b2d4006df940d94
SHA256ea86a1e864f02765eaac605320ffa9e0fe35871145ae040650ce3d60945d4d42
SHA5120e62803fdf293242e95173c14993a18fa12260c873cef059fe7dfdc8d2e7abc74d293ee81ec5bebc027e95cb083b0bffe8f4d978954a7d87e0e09cbb128e7f11
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD51a23f8b0440b586b5f62d5a02628ac94
SHA120f36c4ec34b12db057a0e38f3b3ea7415ace8e2
SHA256465268064484c327b537cba8fa3b2878cfe87547aea58bd4b052b507a3b608ab
SHA51220e8bea88cf8be7ef8f87c72cb0fc7ef2b192ecd9e6311bb1745b7c71fda60b4d5a12fdbd842a8b72fa33a477eff7f26bbc37ebdd35a11f81caae1a64bae610d