Analysis
-
max time kernel
147s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 11:46
Static task
static1
Behavioral task
behavioral1
Sample
781b2017e22978b33669b2e0423b18a6_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
781b2017e22978b33669b2e0423b18a6_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
781b2017e22978b33669b2e0423b18a6_JaffaCakes118.html
-
Size
53KB
-
MD5
781b2017e22978b33669b2e0423b18a6
-
SHA1
3c4398667fc68a7560f3b3ecf45d96f4771470b4
-
SHA256
1d44f14c369340e212e64cff9051737b52d9a629013eb296232759dfed9dfc58
-
SHA512
8b138b2a192b1d2b944a114817508e00ba87642e010da9f491f602277b6907d34ffa3600635f0f44043b47b60eb6071872b067e8bf8991f3457562df952f8e0a
-
SSDEEP
1536:CkgUiIakTqGivi+PyUgrunlYA63Nj+q5VyvR0w2AzTICbbWod/t9M/dNwIUTDmDu:CkgUiIakTqGivi+PyUgrunlYA63Nj+qI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4496 msedge.exe 4496 msedge.exe 5076 msedge.exe 5076 msedge.exe 2348 identity_helper.exe 2348 identity_helper.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe 3176 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe 5076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5076 wrote to memory of 4416 5076 msedge.exe 83 PID 5076 wrote to memory of 4416 5076 msedge.exe 83 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 744 5076 msedge.exe 84 PID 5076 wrote to memory of 4496 5076 msedge.exe 85 PID 5076 wrote to memory of 4496 5076 msedge.exe 85 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86 PID 5076 wrote to memory of 1812 5076 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\781b2017e22978b33669b2e0423b18a6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff17fb46f8,0x7fff17fb4708,0x7fff17fb47182⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:82⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5752 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2184,1992267571143354912,3485606144066660422,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56c86c838cf1dc704d2be375f04e1e6c6
SHA1ad2911a13a3addc86cc46d4329b2b1621cbe7e35
SHA256dff0886331bb45ec7711af92ab10be76291fde729dff23ca3270c86fb6e606bb
SHA512a120248263919c687f09615fed56c7cac825c8c93c104488632cebc1abfa338c39ebdc191e5f0c45ff30f054f08d4c02d12b013de6322490197606ce0c0b4f37
-
Filesize
152B
MD527f3335bf37563e4537db3624ee378da
SHA157543abc3d97c2a2b251b446820894f4b0111aeb
SHA256494425284ba12ee2fb07890e268be7890b258e1b1e5ecfa4a4dbc3411ab93b1a
SHA5122bef861f9d2d916272f6014110fdee84afced515710c9d69b3c310f6bf41728d1b2d41fee3c86441ff96c08c7d474f9326e992b9164b9a3f13627f7d24d0c485
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
403B
MD5a5e84fc8c8314dc6ce99854432f3e252
SHA19705e39a6bdfedf5b67731dd629f33b4f692effa
SHA256bba05e2ef620b77fcd80dc47b18cf5b53873ad2b0f1f9d96725c5e48ff285ba5
SHA51206316a5dea25fb0f8baaafbdeaa8c24e7dc79cb8d7aafc3cdf42c67a9b80d3e35ede8bb44aeaba7013b38c1cfb74f2f6103d73ebe832cc84cce2375f4e24c797
-
Filesize
5KB
MD55184b7e9ff7f269822fe9e633cf9c9ec
SHA142d8e6fbf217d1b3feb2edaa81e4b06275611f12
SHA256aead7b43cd2895fc01856a6a02e43944654ef4b975a53250f307f6c084b43eaa
SHA512c21d506da49e9b95dd6c8a72468025caec6f61b8095e6feb743f1d77eabf7b3c3bdd92242f5893f4ca64fcf8a40c6dd00ae45c5a12bfa99a0f4dfeae74c60c05
-
Filesize
6KB
MD50a402de3764fb4dba29d36d52cebdac1
SHA1186ba8e65a50f85060a9c87ec7329698bc58d36c
SHA256da9e2b8018b7f37b937691cb48a9e2c605b52458144b20fd524f7a22c932a95b
SHA5126140c448fa1180109644cf815b4e86ceba012ab69c7c63335ee9a8047912fdba90c1fa2bbdfc7d76864547e0b268aecf40880cd07fa9781043e471e049b16987
-
Filesize
6KB
MD56b51d89e6b63d10f3759305940b68ad2
SHA1c80a0c6c276b9a99883820b512a3d1c6327bc605
SHA2567de73f9b55892c4c4efc54963dc310f9b971d5cf43c53669ef908f59d4509511
SHA51238e34aabae42cef6ca886c108acbc67bf4433a08785429d9e786e8653bf0bdbb70fca086d7af9b454fb47c33dccb002ca06ced4a2ff6a684821938f489f3ed28
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD595dad1aeedab529259b11d41c6eec30a
SHA19bd9c51633e6447deb4edd75cc822a20bafb0cbd
SHA2561d5a199ac24aa95eb825491cfc36acaa1c10ce78dccb38020eeecbc8dd3c1a25
SHA5124e4b79888df2d0570698eaf302779f90609660b0baa81bddb8d3d618a88e2b45191b695adfcf4ca27599e9822a04867d87bf825e98e9af2b3973e4fdb3519672