Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
891cd6784a21bd50940cc5aeedc5ea5b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
891cd6784a21bd50940cc5aeedc5ea5b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
891cd6784a21bd50940cc5aeedc5ea5b_JaffaCakes118.html
-
Size
26KB
-
MD5
891cd6784a21bd50940cc5aeedc5ea5b
-
SHA1
d1d0f67fec3ee7483298778b3ead167ac133b8bd
-
SHA256
5003b8bd4a9e6416bae9b11989318f4d9bfa71bf6ef6814e203dcd24ad82e3aa
-
SHA512
58fdc84406594960e004e34373c884d9313ad38a7d649358e74b642cc45c645c42679b28248a4d0befc9d40215e129ed65a57b01e2846756478944ba4577cc40
-
SSDEEP
384:qK1qPyVdP69GV1thPnA2sNz1VuqIqkwq17v2XUNqrVyjaGA3c6TlOE+NucMXMzZt:qK1qW7v2Xt/RywopnB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2560 msedge.exe 2560 msedge.exe 2208 msedge.exe 2208 msedge.exe 4792 identity_helper.exe 4792 identity_helper.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe 2396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2208 wrote to memory of 1844 2208 msedge.exe 84 PID 2208 wrote to memory of 1844 2208 msedge.exe 84 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 3916 2208 msedge.exe 85 PID 2208 wrote to memory of 2560 2208 msedge.exe 86 PID 2208 wrote to memory of 2560 2208 msedge.exe 86 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87 PID 2208 wrote to memory of 4116 2208 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\891cd6784a21bd50940cc5aeedc5ea5b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa527746f8,0x7ffa52774708,0x7ffa527747182⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15508022169844987523,14300078502964596348,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15508022169844987523,14300078502964596348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,15508022169844987523,14300078502964596348,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:4116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15508022169844987523,14300078502964596348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15508022169844987523,14300078502964596348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15508022169844987523,14300078502964596348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:82⤵PID:1868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15508022169844987523,14300078502964596348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5056 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15508022169844987523,14300078502964596348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15508022169844987523,14300078502964596348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15508022169844987523,14300078502964596348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15508022169844987523,14300078502964596348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15508022169844987523,14300078502964596348,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD596142ba45f7203a8c4d877b2d70588b6
SHA1e1d1ac761b3c41ba0a3409d7bec68ca22ae1fac7
SHA256dac3fb834fb077720a5a79f49add75e37c15bd07ac063b5516061ffc611c334b
SHA512fe09d408370c5ddfa3264f870118fd2edb2e4184871a8029bb62a438be6da78a8e1f72d176149ce6a4963e9981136dc878aedb1e0c660833482a9850680a4beb
-
Filesize
152B
MD5b367ffa3cd6896506992c5bb8b91addf
SHA193c9bded12fd3a814e4a87d1ab6b102818a9996e
SHA256a2e0b202caf41d3a5fbde3824043e423cc9ce0ec9653a9d1a2d23b04c1467b96
SHA51244e2745fad967ce9b7a2be00b75d6617d441ebe2763d81a8c038d57906b1c94d6d57c930141331c39e032a284b59014646dd9054be213fd973e75a2269466a8a
-
Filesize
5KB
MD551c5bea573a756714137e12b36fa4db4
SHA128e6c9c2247a76f2e11b8678212e0a11ea73f223
SHA25672296c2545ea45f01dfa7ece47905400192a5f3af44d920620fc7cf8363a3cb9
SHA512251f368772096b9288452f56e5081570dbf93a4077d2f7b17cdea0b8e4a5c619f3b0d3919539a696744add662360d0c3b3983e278d566b418dcca288fa51b7fc
-
Filesize
5KB
MD589f7051c10a91c7a0c2edc5a3446cba2
SHA1befd66fb74317ffc66ae1a5bee0187b68a03720b
SHA25618d3f3acfaabf3272e87cadf291aaafc36a3f8c177f62dafdd8345ccecbc21a0
SHA51272ef250461cd4380c73ecfd2e55ce2b9da0359e16a5f4d8205e4830941aee976071d3c753ea4ead2115a2d1131628d4f5de00edaa4340a165f0a5c3f6e068bac
-
Filesize
24KB
MD5852d886f30a60b001ee9e16d15da655c
SHA1713ae02473e2af931fb4455db3be07a00c734e97
SHA2560c05a4e24bafde15c1c9cfa778ac25eb5552c22b1a589b7b473eebc752a6ca68
SHA51209625a70076a264b7138dc14f2fe81b0e8ad6cc0ecb3cc4f5d5bd73eb58fab1e2528c5e3a3a40837740895a5a694b94b2fa174a8595960ef122823a4132d4f73
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD585c1eeca9335b1f65fe4cce9daeb5123
SHA1939231463469d714302f29631ae8445c6d1ea6bf
SHA2565ecdbd0f0d1425c9ba286eed0586956f94d56dd5691ac35dbfbfb699765aca08
SHA51291607a50f0ed56a677c9f6fa19ad44eb920c57f7968da4b97830d54e82473fcc02dc7f80ba855b1dacc285318b2c924037c8aafb6566344ad754d439ae7f0b47