Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 08:00
Static task
static1
Behavioral task
behavioral1
Sample
77741e366652feb05fc0aed64c775f46_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
77741e366652feb05fc0aed64c775f46_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
77741e366652feb05fc0aed64c775f46_JaffaCakes118.html
-
Size
1KB
-
MD5
77741e366652feb05fc0aed64c775f46
-
SHA1
bb2aa4fba07c1bef36438f3624e4edbc38ffe593
-
SHA256
1071784e28e4a4153ff6dbf5202866c994bc7c1cf37f08f0e878fc160f214008
-
SHA512
42ed0c5936e0c2d51953077be711e7a08c4f994a5243396228c9b1499ddca85239ebb3aef067d19cb769bc1ff76b4f4b396a1298e7e5fd44dc9ec514f1ddddaf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1448 msedge.exe 1448 msedge.exe 1088 msedge.exe 1088 msedge.exe 5060 identity_helper.exe 5060 identity_helper.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1088 wrote to memory of 3656 1088 msedge.exe 84 PID 1088 wrote to memory of 3656 1088 msedge.exe 84 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 2368 1088 msedge.exe 85 PID 1088 wrote to memory of 1448 1088 msedge.exe 86 PID 1088 wrote to memory of 1448 1088 msedge.exe 86 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87 PID 1088 wrote to memory of 4468 1088 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\77741e366652feb05fc0aed64c775f46_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffc0d1146f8,0x7ffc0d114708,0x7ffc0d1147182⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2476 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,8965793855203910467,3941772889344604628,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2592 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD51f9d180c0bcf71b48e7bc8302f85c28f
SHA1ade94a8e51c446383dc0a45edf5aad5fa20edf3c
SHA256a17d56c41d524453a78e3f06e0d0b0081e79d090a4b75d0b693ddbc39f6f7fdc
SHA512282863df0e51288049587886ed37ad1cf5b6bfeed86454ea3b9f2bb7f0a1c591f3540c62712ebfcd6f1095e1977446dd5b13b904bb52b6d5c910a1efc208c785
-
Filesize
152B
MD560ead4145eb78b972baf6c6270ae6d72
SHA1e71f4507bea5b518d9ee9fb2d523c5a11adea842
SHA256b9e99e7387a915275e8fe4ac0b0c0cd330b4632814d5c9c446beb2755f1309a7
SHA5128cdbafd2783048f5f54f22e13f6ef890936d5b986b0bb3fa86d2420a5bfecf7bedc56f46e6d5f126eae79f492315843c134c441084b912296e269f384a73ccde
-
Filesize
184B
MD58ba84e3304d106169a04395d8eb926d8
SHA1b03747f70dda8572f01c08b416e31d4a2a5ba36f
SHA256f0510d89fdf9290a8ad2a03cded4447f3fa82b80b486367ff21877e5ec100275
SHA51235de11f55c81bd9c09a189698857481e63823329b8bee84d1abdd2f0855d80eb015720178e4bbe3b49dd9677929e5eca7bca0bbebabe12b8c483a32f5c23770d
-
Filesize
5KB
MD58fec864ba5a4765140d71aa43127e3e7
SHA1388e6e1726d8a7aa07a45e9c5321f4cffcbbb850
SHA256aa270af033c6da57a003b5af6252e2b32ef06d6e36ca2c30bee97e1996044e74
SHA512d67b7522415e8aa5b1d18e71cb46e43e16bed23f2edd345e8fa61365b0c426d4f0493d5122a6356669138ae3814e29d9a7edd72f4e2ab7dc7a4bda7dfce60bf4
-
Filesize
6KB
MD575b2a89a278f83096c4be4ece73436ec
SHA1f470151123da2b94bdf98b16582b2b8b19a5d7e4
SHA256ebfb93ca976114b27e2d373251fe829bcfeef9590c5b5274aa125606c6dd0616
SHA512cc87a4cea5925c43869c2b8f6de2ad9005666b07fedc215f0377c7a58a5f3c4e886e2ed8914b96dd3a6e20d9d69b96b0a02c11fd2f6c8c4b2f9490fa3ee3362e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5da5af141039c0907ab186c6a6c0cb2a3
SHA146cc015351aa3e9aa364c9da9bb0f5b1a83249cd
SHA25620ba79672a4e278a95587e84e7db5c00fbc91ba020c558bdd602f27ce6730757
SHA512c61f1a043359ba057f102877903a82061ca68a2adbf6f73b7e6eda6ee14863fed5f9e3351431d2cefb40227d1d74f0a92a8a557f6e350a5707aaa9a914f8805b