Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 23:14
Static task
static1
Behavioral task
behavioral1
Sample
821c99c378b492de21a05683803c790d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
821c99c378b492de21a05683803c790d_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
821c99c378b492de21a05683803c790d_JaffaCakes118.html
-
Size
7KB
-
MD5
821c99c378b492de21a05683803c790d
-
SHA1
715fd3a75286b07b636520c35b29cc49e0b31bf1
-
SHA256
d33e4d76c18efa0023847490814980f10e97e0ddea371378b3a39ae80dde8425
-
SHA512
4aa3e1a401575f30aa888d2c42306cbd4ca80660cbc4da8d4ac2df38e6e86af3d0f97da5662ba17cbf722ed7ef638e5152e5324cd0530cfc8880c7106d789ab3
-
SSDEEP
96:uzVs+ux7gdLLY1k9o84d12ef7CSTU8zf0b9qQ/s6fcEZ7ru7f:csz7gdAYS/otb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3676 msedge.exe 3676 msedge.exe 2496 msedge.exe 2496 msedge.exe 4272 identity_helper.exe 4272 identity_helper.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe 456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe 2496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2496 wrote to memory of 4016 2496 msedge.exe 83 PID 2496 wrote to memory of 4016 2496 msedge.exe 83 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3688 2496 msedge.exe 84 PID 2496 wrote to memory of 3676 2496 msedge.exe 85 PID 2496 wrote to memory of 3676 2496 msedge.exe 85 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86 PID 2496 wrote to memory of 3208 2496 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\821c99c378b492de21a05683803c790d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffba1846f8,0x7fffba184708,0x7fffba1847182⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5344120071734907593,7136143404596075267,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,5344120071734907593,7136143404596075267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,5344120071734907593,7136143404596075267,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5344120071734907593,7136143404596075267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5344120071734907593,7136143404596075267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,5344120071734907593,7136143404596075267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,5344120071734907593,7136143404596075267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5344120071734907593,7136143404596075267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5344120071734907593,7136143404596075267,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:1516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5344120071734907593,7136143404596075267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5344120071734907593,7136143404596075267,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:4408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5344120071734907593,7136143404596075267,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5244 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD523b6e2531d39ba76e0604a4685249f2d
SHA15f396f68bd58b4141a3a0927d0a93d5ef2c8172f
SHA2564a486d7be440ddf2909be2c2b41e55f0666b02670bbf077ac435e3cddc55a15e
SHA512a1a7fef086526e65184f60b61d483848183ef7c98cf09f05ac9e5b11504696406120ab01da8ed7f35e3145aa5fc54307c9397770681e4d10feea64113e7a57cd
-
Filesize
152B
MD56ffd468ded3255ce35ba13e5d87c985a
SHA109f11746553fd82f0a0ddef4994dc3605f39ccec
SHA25633103b1e4da1933459575d2e0441b8693ba1ede4695a3d924e2d74e72becabd8
SHA5125d5530c57faa4711f51e4baef0d1f556937a5db1e2a54ee376c3556c01db0ddf628856f346057d3849baa5db35603b96a0a9894f3c65a80c947085eb640348ee
-
Filesize
6KB
MD53c2983172d1df2ab4cffa3cb454bf170
SHA128b69af5cda0ae71406f6cc6a123796d131d045c
SHA256f05908a8ef06eddd1b683a460360edde6ab1e4addbc624f408d13c49f4be13c5
SHA512f7a58e4c25c9f767f9cb429349c3b2c0e947f0c3f5f5f76fb5d9e888a873d69c0e1d8e7535e1e45f2a87eccb3df93fe72a88f70546ef9160a4c4c276518208f0
-
Filesize
6KB
MD573cf52bd983908797e03597b2aacc3a8
SHA14ef3a3541087c8ade97a37f14b3d6b2d2787b0cb
SHA2565c40b0f2c76aa6f122f792d615da23fe9190bf6a2bc8834570f70d0183b042d6
SHA5123e4bec17b053c468e31169eb4309532092f26a97c0f45c0ed3977154ba92a0123986e41526666da0d40bb46417e33b8d2d93bb9b56533721ec4f41b645e4a984
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f436f5781cdb1c928b9ffaf89579fbe3
SHA14c6dc197f276ebacbf212e8a8a186022ab63e358
SHA25659a2658d17dd42f9cc265df55b83ce0affc2d41ff9af49cd4ba43e5efc834bf2
SHA51281f6c39f0963e4ba47e4f4d7b168bf024669067a3c11766df4c877e1a20261e992833116443b966dcffcf4b36cbfcf4894dce8943871961f80945d4e2de4f8f0