Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 20:57
Static task
static1
Behavioral task
behavioral1
Sample
00ee014cd41f82da8bec12b8b5303499_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
00ee014cd41f82da8bec12b8b5303499_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
00ee014cd41f82da8bec12b8b5303499_JaffaCakes118.html
-
Size
49KB
-
MD5
00ee014cd41f82da8bec12b8b5303499
-
SHA1
9f5b4ddf9f10feb3a9b4621ecce3ef62d81da09f
-
SHA256
a3b913b1e46a246d44acb0014f122e58f2443e436566b0797057f8c4a263df46
-
SHA512
e24447196a972c562e4c7dc0dde3567ad82d6f0de943470ab39e9b4694f4ec91c5021cc23e793920e8c45afccbcee794bc02185e2b6fa25915b8b4157bef324e
-
SSDEEP
768:dbXXmHHN+1UjD1rtWzwDlYQUxqgKXPg5nMkg+9FAxxeyQ4EG745wd7wm2fmf37Zw:FXXCtsjpU8+y8evmntBnfmCNbFM0hkL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2268 msedge.exe 2268 msedge.exe 2576 identity_helper.exe 2576 identity_helper.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe 2268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 3432 2268 msedge.exe 84 PID 2268 wrote to memory of 3432 2268 msedge.exe 84 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2460 2268 msedge.exe 85 PID 2268 wrote to memory of 2860 2268 msedge.exe 86 PID 2268 wrote to memory of 2860 2268 msedge.exe 86 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87 PID 2268 wrote to memory of 3992 2268 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\00ee014cd41f82da8bec12b8b5303499_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffba8a46f8,0x7fffba8a4708,0x7fffba8a47182⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4224 /prefetch:12⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:82⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4824 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5372 /prefetch:12⤵PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4840 /prefetch:12⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3020 /prefetch:12⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,133051894334180821,2880147540218231466,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5512 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
5KB
MD569f29f01f63b1520e77940a757298937
SHA15c928e894eaaf5049380862d80c3314ce9d70669
SHA256a1d9b4c8759a6e8c732fa258aea7a1510960c3ea8cfa3d0995d024a2c9eccd4f
SHA512a525cd76e4169f12e86a5e1f4ecc807ca902b3f86f46025a94e1cb25c1b09e1d32df3346bd03e7ae66e0794a81737597b241c53b88a76a14ae182cfbd3f2fbfe
-
Filesize
6KB
MD5918583f473931d4028e92665a13731ac
SHA1fb95ab1db3dad94768586872187585e37be597a6
SHA256b5df9b9b65c50627450a2b2a4965512c9ac01885a135de87b049736357b30c59
SHA512c62acd58ae7cba4cdfc8a296ee91807dbb0ac6df6f225517d3bd76f228d1a0321494031cc1aeedb8462f57afbe6836824642c2a5499fee2da8f8bf60f7e411f3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56affe5723d30da6da2ce07372d5f19d3
SHA10cc7ccdf995c0a7089fbadac70368173c798b22a
SHA25626205837b7edc13b00a744b52ddb7d6a0d1229249d46498f1cdd0fdedd46ae00
SHA51293b1f0791c820e74eda4339b439c9bb1e7f9da5528d2ea99c2ded02e57175e3032630e270e2cba0835871429cf7da352753225b17480d47675e822ce86934b50