Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 15:01
Static task
static1
Behavioral task
behavioral1
Sample
96938902294d7ae4a55193d743fd4c03_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96938902294d7ae4a55193d743fd4c03_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
96938902294d7ae4a55193d743fd4c03_JaffaCakes118.html
-
Size
53KB
-
MD5
96938902294d7ae4a55193d743fd4c03
-
SHA1
9a7f3a3e60099dc32750bb665f68207feb07a1c3
-
SHA256
d50420266286be99c950cfaa0a3ee8747fef64225966ef9f6df36a03fc5ce3a2
-
SHA512
b77990754deaa84053aa013126442f9d4327a5ef98a000dea60bd1241d6763863dc047ac5334d3f88d1bcd2c58a474d843b77255bfea084b25bf925c22180dee
-
SSDEEP
1536:CkgUiIakTqGivi+PyUcrunlYf63Nj+q5VyvR0w2AzTICbbaoc/t9M/dNwIUTDmDq:CkgUiIakTqGivi+PyUcrunlYf63Nj+qD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4248 msedge.exe 4248 msedge.exe 3136 msedge.exe 3136 msedge.exe 2256 identity_helper.exe 2256 identity_helper.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3136 wrote to memory of 1672 3136 msedge.exe 87 PID 3136 wrote to memory of 1672 3136 msedge.exe 87 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 1688 3136 msedge.exe 88 PID 3136 wrote to memory of 4248 3136 msedge.exe 89 PID 3136 wrote to memory of 4248 3136 msedge.exe 89 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90 PID 3136 wrote to memory of 5100 3136 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\96938902294d7ae4a55193d743fd4c03_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbe5ba46f8,0x7ffbe5ba4708,0x7ffbe5ba47182⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4368 /prefetch:12⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5352 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5428 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,4277193007258826178,11279509458739348766,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3140 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5709c6f4a32b317f6487b598788b6353d
SHA150f44d43be9630018f0bd2acb1528df07cd05b7f
SHA256353aff71e8cf078c88c836e66d86be266ddbe36496a597b9b5a5a87d21eae83b
SHA5124f33792eb73a792c88e8e2dc8bef7b00a2af7b1b91f4bab0cd5076dd2cb9abbb752eb7e60a4c6204d15f9bca1562915f2468b94e5f01f79279e1e7469055f0a3
-
Filesize
152B
MD59ebc024cdb324eb41f33c6ec63d1458d
SHA1f623e96981ee63c1b6879f682c4364fd5c2265e5
SHA25623b9bd7316816043f42a80784e7f247f3afebd3dbe370fbc702189a6a0dddb1f
SHA5126971b6430bc01a36c48bc1e41cf8c4bed65a2890837f7778a896072159940ae739d11834176cc7be6cf6fa0f2ea9e6764c30cd23beadcc88c390e5573bbad097
-
Filesize
5KB
MD559d6653a50359523c1a90865ed193658
SHA150bda5884d3d07c05342c67dd9a3a639a201fdf5
SHA2569205f297ba130a51a57c57396390107ff50db9bd3a1315d5e1a6efd422b25dd8
SHA5125ca93939a35d1a0de73e3fc67b51e473f535d5b7f7f81777d4694596b9c355e634d5051f102f741678cab7180ff3837214efc030ee0f66c7cdede2e4041116c3
-
Filesize
5KB
MD559f827a95dbba21a005dc92d9977a0e7
SHA16711a4dd8b0a623cbead0141e3ca969c1ca38c80
SHA2562ef7f84843ded507b630d06ab67428fe9ad0422791080c0c8d00263a9ba647b2
SHA512aa9f9df74d522a2d2e7b07a86e71d663b4dbc9ffbbdb92ed22c1b55982195231a7a232c2fb6a6489d1fac023a5b405d5164eff7b03463ee4042db8f35c22509a
-
Filesize
24KB
MD5494a861dfe3fb61b7f6e9a8e1f92d179
SHA1903db9c91a888cdd2a359e921ea2c1a958228aa9
SHA25646ffd9cec0b1524402f64218ea9584cb751cd61e56eae54ac0ad61c55273c690
SHA512f97bfb87546ee38f100ef52f6ee6d102d05feb378a940954a1953f5dc301e6ae7a91de2b2176dcac165a61abf867e06e3e31572a378b1abd9ea2768de76e7175
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50f69890e31925e42ec3683ace9ff92ee
SHA1687dab37f51bd0a6311831b2694930bfc157f4d2
SHA25614750b4f0496206f1475c52274bbe33bbbbcbf32070ad7ac7335afef2aba1132
SHA512526bc4e711a2f62471d0d244192a28754151f1c13230509f20ac807df0e4f8d5db0189e1b4cce8179fb54683f49a9cda9e2811fcceae709a124a6f96b50444d0