Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 21:09
Static task
static1
Behavioral task
behavioral1
Sample
a8379c0669019e11f32d40872ec68706_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a8379c0669019e11f32d40872ec68706_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a8379c0669019e11f32d40872ec68706_JaffaCakes118.html
-
Size
15KB
-
MD5
a8379c0669019e11f32d40872ec68706
-
SHA1
657b92db4bda407ff2204a2adee40eb8547bb6ac
-
SHA256
5d95ce422ece1257f670f9b55548a8902077cd2ae6d8c44f2218704fe265775c
-
SHA512
18e6aa8af2bfcec9316520d20ffcece2cc648297cd3b037e20995fe1b767b9c224dcb5eab042d9fb465d59217ee75a93281576e136d408812d1e350f1c1de7ca
-
SSDEEP
384:/rDEN7eqvXOQre6ADpdAVMdjtv9uDhBD3sD:/riNvXt6pdBdjtisD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4468 msedge.exe 4468 msedge.exe 4004 msedge.exe 4004 msedge.exe 3128 identity_helper.exe 3128 identity_helper.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe 5580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4428 4004 msedge.exe 84 PID 4004 wrote to memory of 4428 4004 msedge.exe 84 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 2076 4004 msedge.exe 85 PID 4004 wrote to memory of 4468 4004 msedge.exe 86 PID 4004 wrote to memory of 4468 4004 msedge.exe 86 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87 PID 4004 wrote to memory of 2212 4004 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a8379c0669019e11f32d40872ec68706_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8fa446f8,0x7ffa8fa44708,0x7ffa8fa447182⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:3952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6060 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6060 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5884 /prefetch:12⤵PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,3078038397508568656,16167204820949914926,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:212
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
260B
MD5c1dc1fce8f65d5ba9d3900481cf7ae57
SHA1ad1b066caac37a60aae4f8ec17adfb2413c1694b
SHA256aa178da5e2c6c6d0476b95170de5bf5e481747a01ead92460a7bf091b4da29c6
SHA5126d4bea860b1a70a023399858999a735033a4f271efbc557da0d4437fadf02746d52366adf430a2df913c79eef7844dfa01e9872e042604d2a2278a71678e33f3
-
Filesize
5KB
MD5ac15a2a65152c673211a40e95a332b1f
SHA14fd18831c4bb41fa6fe35551373e847a317f72b1
SHA2569120227cad2565b1d66c7379dd63f155da4038faeff419d27c7d6e276dcaed90
SHA512a190da872200961067909875e8628435abb10fe5e3b857700b2d825a9cc26965e65fc00bc45c0190f3791cd24f34b2cd00db427d41a1d7c50136e724c2f00b2a
-
Filesize
6KB
MD599442468f40d62aaf2ce0757f6524aaf
SHA16da15c84d1dadf7e43346af65914fd129cf53492
SHA25646e026396dcd0672c7b0a064cadc8231a906273b52e5adec8feae1887dc6853e
SHA51257ade4539839ef109f75ac9d6eb1edece6eb315a76111b0e15defad095677c75c766284cd168015736996cde65cf5a297d5d3dc4b69342af3e0aed6eaadd490f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50fd1b0df2a7f44820a8cd47523cf87c6
SHA16a45124b258ac246bafa372d54ba67d6e3631ca2
SHA2569ee96b7d8202f551d2a97b735fdf21dea23dfe94815985a3c8552445fd869e53
SHA51290418d8df1a75a6ab93b31e4d5a4f0aa47568197f59d592ecab41fc010fcf6f484aa0126526a96ac777241bc0152485713ad470af54c61b7c8f42b65f12b33a0