Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
756c777fc11326e3e7102ebbefa24eec_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
756c777fc11326e3e7102ebbefa24eec_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
756c777fc11326e3e7102ebbefa24eec_JaffaCakes118.html
-
Size
4KB
-
MD5
756c777fc11326e3e7102ebbefa24eec
-
SHA1
b551b2457bece62bca39975b228ca2ae7d05e270
-
SHA256
461f6b912b84c2a90f7082023215789aa0a27e9807bc13ae14a6dd708d4923a0
-
SHA512
4909dd0744d8027c7d5af91f99481032f0c7e0078f50350d89714f4cc1c66b383c62b920609a9f078800192d7f1164a125f5e4fa6e15159f45f117b140ddeffe
-
SSDEEP
96:qXLTrZWJ7XMleZE6dK0KXOKo0so6JYregKH0sOgKlsgB2FGgKl:qXLTEyoyBUpYmM2Fu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 1768 msedge.exe 1768 msedge.exe 1808 identity_helper.exe 1808 identity_helper.exe 6060 msedge.exe 6060 msedge.exe 6060 msedge.exe 6060 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe 1768 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1768 wrote to memory of 4256 1768 msedge.exe 84 PID 1768 wrote to memory of 4256 1768 msedge.exe 84 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 1068 1768 msedge.exe 85 PID 1768 wrote to memory of 2860 1768 msedge.exe 86 PID 1768 wrote to memory of 2860 1768 msedge.exe 86 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87 PID 1768 wrote to memory of 1724 1768 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\756c777fc11326e3e7102ebbefa24eec_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe6ad846f8,0x7ffe6ad84708,0x7ffe6ad847182⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2760 /prefetch:82⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,15022907186365990048,8467467483600185917,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2296 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:6060
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3544
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
6KB
MD52ede1e034a33406e98a97925c1fd3a99
SHA1e37195f8621ec699fe3a069e2eac46df098029cb
SHA2567cb36d9ef051ef5aa6085d173f4a654d7aa92bed2518381aae8c9b2ffdd5cb35
SHA51250bde4d39a3c1cd3bd9b08a89a03719a658161a700c8ee6d59362e48080941789a0cb69ca625dd38108e785db83ca90030faefc86a4d8a350045f9e3855f4dc7
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d259703d-00b3-4ef5-8cd1-be3c40a331f1.tmp
Filesize5KB
MD5badb47ce160304eed1212d61a27bd9ef
SHA173f5cf2f2b16b81991733edc1eedab1e2e888ac2
SHA256cfe762442c7d779828332e06ef7f2b1cfdb96a94199a75dc59d371bdc380730a
SHA5128a8e5ea616d523c39ef2532185b55036f2071c658c122b7f5dda49cd1163cdfbf8ba28f66ef8358bf6fd85137eff7a61e88aaffcb5410cb3b4e6aef19ff00d3d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57b422641ff1091a3ae240e44445d46ed
SHA1a29d808aa57c9944bf440dfadf8b9f87f8b678f9
SHA256e11b1b18d27804889c418965e6b1d32c3b80973cffad9d8c8f4d99694e7fd68c
SHA512ba9bac7168254764f226287d8bb2b2b233bcd8c82c521e6d4e09d51cb07f88682be433a62496e458cba916bd2d603d18b0772f7143729b882fdd6b4e6acc5a2e