Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10-08-2024 11:24
Static task
static1
Behavioral task
behavioral1
Sample
85dee915df19adf6f1d05a1624474fe4_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
85dee915df19adf6f1d05a1624474fe4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
85dee915df19adf6f1d05a1624474fe4_JaffaCakes118.html
-
Size
51KB
-
MD5
85dee915df19adf6f1d05a1624474fe4
-
SHA1
c19f9fc41e3590d3df88bce3e450369d118945c3
-
SHA256
bd3fa453eb7df22c14f494751a2975d615147210526554048223015a12cc888b
-
SHA512
7c2291ccafbc0cf3d641f4b5c37bcca26ad903dbb9bf408d7d3f285c5ed33d4c503897fd7b785492f9fe5d415957b78d598994c4b99513644ab7baf55047f06a
-
SSDEEP
768:hR8Lg2v98isZ1JEZROj1OhUSS5Glrkbpkel/yWXVLlR08Sk13I:b8Lg2v98iJORLSSaJeXZ13I
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1076 msedge.exe 1076 msedge.exe 2696 msedge.exe 2696 msedge.exe 4360 identity_helper.exe 4360 identity_helper.exe 612 msedge.exe 612 msedge.exe 612 msedge.exe 612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe 2696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 4756 2696 msedge.exe 84 PID 2696 wrote to memory of 4756 2696 msedge.exe 84 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1436 2696 msedge.exe 85 PID 2696 wrote to memory of 1076 2696 msedge.exe 86 PID 2696 wrote to memory of 1076 2696 msedge.exe 86 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87 PID 2696 wrote to memory of 4912 2696 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\85dee915df19adf6f1d05a1624474fe4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9c6946f8,0x7ffc9c694708,0x7ffc9c6947182⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8042295879625122440,13483032161170660590,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,8042295879625122440,13483032161170660590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,8042295879625122440,13483032161170660590,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8042295879625122440,13483032161170660590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8042295879625122440,13483032161170660590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8042295879625122440,13483032161170660590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8042295879625122440,13483032161170660590,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8042295879625122440,13483032161170660590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8042295879625122440,13483032161170660590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5204 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8042295879625122440,13483032161170660590,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5668 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8042295879625122440,13483032161170660590,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8042295879625122440,13483032161170660590,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3724 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4292
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
430B
MD5fa836782feba4155868f1141548e2073
SHA16f91e49218628de4e178af0bfd274b7b7aa7e553
SHA2568096dcc0679f78f7c827c9ba9d163b97d795e43e8ad90502d3b6e5d93aeed318
SHA512a31a3ad65287601b70a9b3c1f72c61c980050ab593ec14a1fd2c8e090f108e392cdd5e323392693b7498748152bf1788136de04cad54e38c834a06c081f27711
-
Filesize
6KB
MD5acdbf1f3f3e6a9ec20bfff0165cd6920
SHA19b390817f8a4ec9332a935f9ab34099dd00a90a2
SHA2563a68fa8599be958067793eacf992040baface5eb9d689828034a34b62ade34a0
SHA512399283e5c185a4c8ebc5e9c68530f2c426b3266b4f57e0b60046380d3c44a20d73ab1ef78089475c7be5e98c3d5bcc0a7cfc9704cad328ce5fa778e03aca4204
-
Filesize
6KB
MD5f655dbdf6645f39637eb9721f11343ae
SHA14bf2dfb847185bfdaea11e9392781b07a786bdd9
SHA256cc405202e19808139411f57ec616db8bdf70064eca9fae2548d76faaee458606
SHA5121903ca02c442d92cdf7b69947dbe934bd64fdee5779cb37643d5cf5e584ab4a0da17e2fb46f96669d9edfb262ff17d574d7ee9d16338befe8627022bb47c6cca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5f36aa20800dddd6ccd64d46db21bc439
SHA1a1e9959fe69396940382eeb23fb524df65b21b77
SHA256cf813d413a2a0935f64444fadb5a3654ce1a4d3193d41ad70ee6a96a4568a4e8
SHA5125132bc14e308babad72a7443664c4a667aaa341d832b1522ed82e9058f9a9abc79e64d87610c82e3c9a5e0e5110eb75a7679b0d7ecd793bcaa9fb893912269e4