Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
28/07/2024, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
055747f99b44e1e1e10e576c96eae53c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
055747f99b44e1e1e10e576c96eae53c_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
055747f99b44e1e1e10e576c96eae53c_JaffaCakes118.html
-
Size
37KB
-
MD5
055747f99b44e1e1e10e576c96eae53c
-
SHA1
d61e828678a7b91ab3d5e8d3cd365063d07e9699
-
SHA256
82fab73fd9e0ad829dcf8760796480fa9596fb28e3b4a6183c56b644d0ab173d
-
SHA512
b2acba8f3ffab2865a6de296cb19f42a208d1afd39f7b3009b0c0e94e156454bfaeb13b892a20cfcb49b1cc866c503351ba5c71f8f3cf38480180e0cfef15980
-
SSDEEP
768:EQOfiPWsfJ955yOJFhwXlVhnI3eQqBDX4EVSYhpLZZlkOYKt7Y+OgV2yRGzn56Xq:ENWWsn5YOzKXlVhnIOQ2hVSySYfP0tZh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1396 msedge.exe 1396 msedge.exe 1080 msedge.exe 1080 msedge.exe 2012 identity_helper.exe 2012 identity_helper.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe 1080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1080 wrote to memory of 3940 1080 msedge.exe 84 PID 1080 wrote to memory of 3940 1080 msedge.exe 84 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 376 1080 msedge.exe 85 PID 1080 wrote to memory of 1396 1080 msedge.exe 86 PID 1080 wrote to memory of 1396 1080 msedge.exe 86 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87 PID 1080 wrote to memory of 4920 1080 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\055747f99b44e1e1e10e576c96eae53c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffaaf9446f8,0x7ffaaf944708,0x7ffaaf9447182⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4238748157874119349,5514504572914287292,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,4238748157874119349,5514504572914287292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,4238748157874119349,5514504572914287292,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4238748157874119349,5514504572914287292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4238748157874119349,5514504572914287292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4238748157874119349,5514504572914287292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,4238748157874119349,5514504572914287292,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4238748157874119349,5514504572914287292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4908 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4238748157874119349,5514504572914287292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4238748157874119349,5514504572914287292,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3936 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,4238748157874119349,5514504572914287292,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,4238748157874119349,5514504572914287292,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3464
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5584971c8ba88c824fd51a05dddb45a98
SHA1b7c9489b4427652a9cdd754d1c1b6ac4034be421
SHA256e2d8de6c2323bbb3863ec50843d9b58a22e911fd626d31430658b9ea942cd307
SHA5125dbf1a4631a04d1149d8fab2b8e0e43ccd97b7212de43b961b9128a8bf03329164fdeb480154a8ffea5835f28417a7d2b115b8bf8d578d00b13c3682aa5ca726
-
Filesize
152B
MD5b28ef7d9f6d74f055cc49876767c886c
SHA1d6b3267f36c340979f8fc3e012fdd02c468740bf
SHA256fa6804456884789f4bdf9c3f5a4a8f29e0ededde149c4384072f3d8cc85bcc37
SHA512491f893c8f765e5d629bce8dd5067cef4e2ebc558d43bfb05e358bca43e1a66ee1285519bc266fd0ff5b5e09769a56077b62ac55fa8797c1edf6205843356e75
-
Filesize
5KB
MD5cda870fae69cfe9d535c65d481048074
SHA19154688ce62310283eb05a54ba9d8210c4ef036d
SHA256f044c9fd6456473673ddb3902a84944018ac70723ef6c5ff2592cce9bc7775c6
SHA5126177c43f1b473ead58307988fa0e2c84a13fe9e72174fec9481054f4e2bbbba56999075649d9d7c9e086afedcd4d292fb717c9b3f3d6041c7cdec7ede189e925
-
Filesize
6KB
MD521120ab1db74cac441d7cdf2782501c2
SHA117b61e37c28b0e9cf855eeb3f5ac3765bd61a4ee
SHA256ccd215592c5f6c175e8cf273294ca8ab064a2f895b094bc633aee2e9cf804750
SHA51272fc810d007dbc6c88c009cf77a901e1dc76d748307ea2fb75c5d5e5c15aa86e42c6d6caafbdad14b11b2ba7397175a1740db459056c982294a56486baf5d837
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b51c96c7393a062bcad83efe0762dd5b
SHA13803307fded8abd62cda60284a77f2b48ad0aa82
SHA256368b3dff8441996659b7a94b2c38ee897cefcb460f68cf59215fd22b427baf49
SHA51274de2ba123d2f36845d68843f67f268e4302dee9a2b170ec1461899c41feb809cf2c5f166a8e47eeceed9a809be4cf06fae6a066d9fb09f54948108c23fa5961