Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 16:37
Static task
static1
Behavioral task
behavioral1
Sample
abc3ef635ed0d5e2c7df76adfbff4715_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
abc3ef635ed0d5e2c7df76adfbff4715_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
abc3ef635ed0d5e2c7df76adfbff4715_JaffaCakes118.html
-
Size
24KB
-
MD5
abc3ef635ed0d5e2c7df76adfbff4715
-
SHA1
ad487c8b1aacc8b9597d33ac9d7586b8b1ac2a13
-
SHA256
9642e1a00621268e7280a0727e26ef7a8ed5a9f9839e317d2dad63c95f7dbd7d
-
SHA512
499ae5c1fe2ca16934d708dbaa3e1e638c56b334e5264000515af6250cf76f20b7f8f8ba01101deefbb7c128264437574aa42d193caa6ae86e3340e5c7fb6311
-
SSDEEP
384:jbCJlv55yi/qu/VXVYGMnvE1C9idPnsGE:jbCDB++IMCiO
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2100 msedge.exe 2100 msedge.exe 2524 msedge.exe 2524 msedge.exe 1264 identity_helper.exe 1264 identity_helper.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe 4232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe 2524 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 3488 2524 msedge.exe 84 PID 2524 wrote to memory of 3488 2524 msedge.exe 84 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 1196 2524 msedge.exe 85 PID 2524 wrote to memory of 2100 2524 msedge.exe 86 PID 2524 wrote to memory of 2100 2524 msedge.exe 86 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87 PID 2524 wrote to memory of 780 2524 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\abc3ef635ed0d5e2c7df76adfbff4715_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffccaf746f8,0x7ffccaf74708,0x7ffccaf747182⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5043205253731685383,18299389370675108330,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:1196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,5043205253731685383,18299389370675108330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,5043205253731685383,18299389370675108330,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5043205253731685383,18299389370675108330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5043205253731685383,18299389370675108330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5043205253731685383,18299389370675108330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5043205253731685383,18299389370675108330,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5043205253731685383,18299389370675108330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,5043205253731685383,18299389370675108330,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5692 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5043205253731685383,18299389370675108330,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:3808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5043205253731685383,18299389370675108330,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5043205253731685383,18299389370675108330,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1532
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
1KB
MD555a57956bb1e377bdcc20282f6e6d06a
SHA18015967a850bf206f20d4fc69ec5595cc65347e9
SHA2563465c19eb1e34d3f13bc61104576dc06611e97218f81d6e7af5418979b6cde06
SHA512faa2edf0027604656a6c090a24cb4f250f9d4a6d982b29a5b8b1cb528c5c27044d27757e8867cb8a7b35191bdaeac6206d43cfaddc06a7e16d3c31d576422d95
-
Filesize
5KB
MD52e393d8853948378e317260d137c4cb7
SHA1f3232b24d266d0e1a8dfc34a36093f373d668365
SHA2561fd9ea2b45810f79f7a844333ca27b94078a43eee4dde4676ce1619d0abd4b89
SHA51260e908bc80a16420226412be9191167355d9d3d149da62cff5b7809ae1fdf8e2c35135bb9745ae2346f061765fe33fc58f0cbb88e9fc2fca46f2a58d29d09bb0
-
Filesize
6KB
MD5467212ef956c61b9a5b18c0ab8cb5968
SHA12ce1ef27985731426af6afc66adb1027fccbefcb
SHA256388bdd533a7d03d666b6934171551718bd304b761742aa0ea1bbc9f39cd1ee78
SHA5120eef58f1e676be0ce2c596806eaebbd550e2ec1b4fa31981e5d4a019c43a7fb1de6e568b3122c3c98ec647cd7c62e019b4b41f67b74fd7b1f959360e179f2f78
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57720004bf57ce23f9756c6675f47d9c5
SHA10ab3f2616eeaa8fb02facef55a2c842c6f29fd28
SHA2566b9eb5d6cf3f9c570b590c7ad54b1ea01789341ff4f2023bb95406f3f98f38f0
SHA512ca0ef6ccf387f068713cfbb9313a47e9b695c4952ada77910407f0c9c8058be352ea8ac7c4d7257e27a5aeb6f4eb8f7e1ae4149ea9c5081a883d5cf012a73d41