Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
84e7bc72ce21c2635b98085ee186854f_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
84e7bc72ce21c2635b98085ee186854f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
84e7bc72ce21c2635b98085ee186854f_JaffaCakes118.html
-
Size
2KB
-
MD5
84e7bc72ce21c2635b98085ee186854f
-
SHA1
336bb6f2573d2fc03136b2b2c77dc88f089387f3
-
SHA256
ddfe1622aba3b411e8a9afb4f3ba90691a0d2c49b55bf0b2675112c9e3beac03
-
SHA512
ef5a93642eb86b334f8848282bbec72b70cf6b2e18632d7e6b4eb0508b193bf2d2b85ede6f53bfff0c43f582b637a587a077b8f90e9aa4d9799e4f98e9cfafc2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 4304 msedge.exe 4304 msedge.exe 3140 identity_helper.exe 3140 identity_helper.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe 1952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1276 wrote to memory of 4920 1276 msedge.exe 84 PID 1276 wrote to memory of 4920 1276 msedge.exe 84 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 1780 1276 msedge.exe 85 PID 1276 wrote to memory of 4304 1276 msedge.exe 86 PID 1276 wrote to memory of 4304 1276 msedge.exe 86 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87 PID 1276 wrote to memory of 4896 1276 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\84e7bc72ce21c2635b98085ee186854f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab75f46f8,0x7ffab75f4708,0x7ffab75f47182⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4192 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3220 /prefetch:82⤵PID:2832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5540 /prefetch:12⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,291015475888882818,13594923568922185695,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3556
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
6KB
MD5ab7c3c80e6833b96505ab3e940677a45
SHA1711f96d0866dc836ebd5eb4d9613bd9cab5efd1d
SHA256fcc305190da69c0e746a2a47154793eeea1a53fb5902896b685034545a04120d
SHA512b3c6a84a4af3010bfefa8b6d9a91e7b6bf93eb4df550a0a8db5d72bfbd36cda0789b896767aa906d4f9f0aaf355d0b7fbecc072289ad31797e8a1cf96ed2e1da
-
Filesize
6KB
MD557297926d70cfbe02ad5796244f5d95a
SHA1e365b413e1236d0685e905a584b2981becb5e530
SHA256431a41765e0c46f89b02607f16c21c01c9751b1ba59ad39ec753122e52e20629
SHA5125ddb7637a86b68c705c56a9741a43c08bef18d550815c9fdd567433273a2fdc011756e42c2bfbbf8e8f994a32574782c7948c995bdf427bd82cacab0b060984a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5264db7d2fe5c0f47e9f29412a5e0e759
SHA1ceb5fd4402bc3b2527e70a9de762f774c9225a6a
SHA25623fc2851ac85124964924509702c8b97487d0a05b66bc5d6be5d7b236952c97e
SHA512df5602fffd9b6bb8fdd8a1b57795f373af3be7692b7ef6403b26b57ab1c1328855e7785a7ad88a382cffd01770adac2e41b7683daa0a88d8a8589add34499447