Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02-08-2024 04:53
Static task
static1
Behavioral task
behavioral1
Sample
831af52fae3e14fc3c6654d41ef04234_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
831af52fae3e14fc3c6654d41ef04234_JaffaCakes118.html
Resource
win10v2004-20240730-en
General
-
Target
831af52fae3e14fc3c6654d41ef04234_JaffaCakes118.html
-
Size
14KB
-
MD5
831af52fae3e14fc3c6654d41ef04234
-
SHA1
8557f33e5491fe2df2b040bb6f46552bd42d265d
-
SHA256
8362d44ed0a9acfba66a527494782b27f19f5e595a598827a23e34ab958f5671
-
SHA512
85c5f83f40eb538b17bf14c5c660c8955eacc8a17657fedb6818aadb0bc105135607265aa965d769f55ae241f9b738e20a34d683d337e2fefd585ecae7aee34f
-
SSDEEP
384:04lI5NHSMmmm7mmmdoLzWHnmmmx29mmme+mmmP:0LNnmmm7mmmdownmmmEmmme+mmmP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2824 msedge.exe 2824 msedge.exe 956 msedge.exe 956 msedge.exe 5004 identity_helper.exe 5004 identity_helper.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe 956 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 956 wrote to memory of 3384 956 msedge.exe 83 PID 956 wrote to memory of 3384 956 msedge.exe 83 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 5080 956 msedge.exe 85 PID 956 wrote to memory of 2824 956 msedge.exe 86 PID 956 wrote to memory of 2824 956 msedge.exe 86 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87 PID 956 wrote to memory of 4156 956 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\831af52fae3e14fc3c6654d41ef04234_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda17946f8,0x7ffda1794708,0x7ffda17947182⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,585549945511114196,16731482418922535298,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,585549945511114196,16731482418922535298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,585549945511114196,16731482418922535298,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,585549945511114196,16731482418922535298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,585549945511114196,16731482418922535298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,585549945511114196,16731482418922535298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,585549945511114196,16731482418922535298,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5248 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,585549945511114196,16731482418922535298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,585549945511114196,16731482418922535298,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,585549945511114196,16731482418922535298,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,585549945511114196,16731482418922535298,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,585549945511114196,16731482418922535298,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2556 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD554a5c07b53c4009779045b54c5fa2f4c
SHA1efa045dbe55278511fcf72160b6dc1ff61ac85a0
SHA256ff9aa521bb8c638f0703a5405919a7c195d42998bedc8e2000e67c97c9dbc39f
SHA5120276c6f10bb7f7c3da16d7226b4c7a2ab96744f106d3fea448faf6b52c05880fe65780683df75cca621e3b6fff0bd04defb395035a6c4024bb359c17e32be493
-
Filesize
152B
MD5d3901cd618f65d66fb0643258e3ef906
SHA1c9b42868c9119173ff2b1f871eeef5fa487c04f6
SHA2561f74c3d5f4d41c4d5358e63ad09f8cede236eb66957f9888f42abf98b238c086
SHA51289c122ea72ae3f26c94e34040e0f0a856506c8490ba36fce371a731b3f0588407c6356cca2ebea37ac829a67c2b398e298a64d5a72712172f69071264ca58e98
-
Filesize
6KB
MD529387db4830bea601dd5e4f14f8a4069
SHA15b26ee6a561c7b0fc3936cd2c6d61329a89b76c8
SHA2565fc7d61050f7102e8b92012ecfb14a59af83232aae72df4a9c0633b7dcae275a
SHA512dc1c3000206c608abe3886e1fd0a16ddaa8dd4013a78ba21e9accef0ba6fd6839e6276746e0bf1741afd330a32543050000596f30c2a403909db5af48dde7aea
-
Filesize
6KB
MD513d5a14529d13f9a6dd34bdcf812b02c
SHA1f5c64be68237410572d892e7478633d1d6cb22d6
SHA25686f443e2abda4d067e444fa6aeba186e282069c744cb8432147c10fe182adc8f
SHA51289cb636544b9040a13204091c6a4bd4e444135ae060efb2e9689f6f8aff668fb09ba14da2da0839a9a36237daabdd304ad1b928f286495e6d082936de3422287
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD567c8f2be961cb98db50a96be43caea2e
SHA127acc2b8ff805dc6c2f654de6c637167b5ffd398
SHA25614763c1448f77b51eb07e2a57785da98e55a1da6f5c02441faf0df7cbe826343
SHA512f87e035ec2fee80d9f2a6382edd6779227b1b440b8c6aa512c20797591107135a0e4dd7d8ed2811d9001aa48842e75d1229b35938ba448c536d55f9fa0f8f040