Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 16:45
Static task
static1
Behavioral task
behavioral1
Sample
96da65d7cf6c0e6bc8daf045898ebcf3_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
96da65d7cf6c0e6bc8daf045898ebcf3_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
96da65d7cf6c0e6bc8daf045898ebcf3_JaffaCakes118.html
-
Size
58KB
-
MD5
96da65d7cf6c0e6bc8daf045898ebcf3
-
SHA1
0a8e2533917509b40cc71d270e8686c122208ea0
-
SHA256
06aa6dff10fd4b096fd646e3a0763e1d55c29a1093ba717fe0822339ab0f33a4
-
SHA512
3e952872626a97890aa9b6f270be4bdd4fab7d1a5b7eeb6e19e6e7ff863ee89643cd1533d03dc8d945b89937e87a6c6af57f99b52e94740e587686f56af46eb5
-
SSDEEP
768:khf3CZYf8Cg3tTgWG7Pm5fyCdREWWVW03aJlnOWdpo5gdUnJXa:kAZqg39gWGq5fp4DgOWdjU4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 2552 msedge.exe 2552 msedge.exe 4820 identity_helper.exe 4820 identity_helper.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe 1460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 1464 2552 msedge.exe 86 PID 2552 wrote to memory of 1464 2552 msedge.exe 86 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 1968 2552 msedge.exe 87 PID 2552 wrote to memory of 4468 2552 msedge.exe 88 PID 2552 wrote to memory of 4468 2552 msedge.exe 88 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89 PID 2552 wrote to memory of 4204 2552 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\96da65d7cf6c0e6bc8daf045898ebcf3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc201b46f8,0x7ffc201b4708,0x7ffc201b47182⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13334445844104155832,584110662098839356,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,13334445844104155832,584110662098839356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2364 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,13334445844104155832,584110662098839356,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13334445844104155832,584110662098839356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13334445844104155832,584110662098839356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,13334445844104155832,584110662098839356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,13334445844104155832,584110662098839356,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13334445844104155832,584110662098839356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13334445844104155832,584110662098839356,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4688 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13334445844104155832,584110662098839356,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,13334445844104155832,584110662098839356,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5588 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,13334445844104155832,584110662098839356,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
6KB
MD5b9d1b44ce4f7701d7aaee84ca2e33b4f
SHA1e1a0e46f3e9c3f7750033851b65d4cfdf8bee463
SHA256c94d56657d99db83baad963d7acd5decd8ee2c4c51d257fe2a26550d1420d9d5
SHA5120599e68bd6c9643fc1afe422df0154b8c03c592facca83dd40e7845064ce583845d581690e8860b6fde19b0c0ee3b7fa88186c94fc09aa367b20d3f03967e23e
-
Filesize
6KB
MD586ac0d249694d76838de0b406a11c809
SHA1144c0afe1095439bc3dfa912238d5ed92a97fbc0
SHA2569623d609487f62443abf6e5aa882422221ce93f4f743c631023a94a9fdf73535
SHA5120f067ba67a0ccac1c96977ab757e64612e8e4fcd5f8be654c4422e38eb70013206a5b0b3eab0937c24bfb4db49468380b08a517caa548893840b64bea266f78a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5dcdd051a592fba5f5eb9ca1bb95baa76
SHA14a4beeeca67483beee468ad570211ffce49c4835
SHA2565395f75df7a55a461b32769087735f2adb4bad91ef93ffb2bbf40989d59874bf
SHA51293b2400b067b86cdd26f6c92bb184adca8bd428806e1510bc9f590f7dce944fdd6fc4967a17204279473a50dc2efa4de580f3f244d9fd04ac8cdb77e593dbd99