Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 14:20
Static task
static1
Behavioral task
behavioral1
Sample
af8f624f2f81e849fd1d0b5b71b1e3d0_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
af8f624f2f81e849fd1d0b5b71b1e3d0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
af8f624f2f81e849fd1d0b5b71b1e3d0_JaffaCakes118.html
-
Size
21KB
-
MD5
af8f624f2f81e849fd1d0b5b71b1e3d0
-
SHA1
67431686eccd7dde08d19c67421da455739f8806
-
SHA256
1de20b9ac88aed5cfaa5ff8457d0b418807b285b66206fbfa19b53e8ec6e0796
-
SHA512
d0ee62c8094edb4d0177027d27aaf502491991a021691a3b87acdd20ef31942cf898fdd3a226d725c70f4598721d21a4f6f20d2b2c3615c887b2d7c8154c741f
-
SSDEEP
192:/n4V9nRUB/3ri+bKBlByOM55qqt3NKq6abnCp:/n4VIiFBvMuqXKqCp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1856 msedge.exe 1856 msedge.exe 3604 msedge.exe 3604 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe 2720 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3604 wrote to memory of 4548 3604 msedge.exe 84 PID 3604 wrote to memory of 4548 3604 msedge.exe 84 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 2796 3604 msedge.exe 85 PID 3604 wrote to memory of 1856 3604 msedge.exe 86 PID 3604 wrote to memory of 1856 3604 msedge.exe 86 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87 PID 3604 wrote to memory of 1556 3604 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\af8f624f2f81e849fd1d0b5b71b1e3d0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff220d46f8,0x7fff220d4708,0x7fff220d47182⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2404 /prefetch:82⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4256 /prefetch:12⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5652 /prefetch:12⤵PID:1136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6056 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,1001454822377202548,10742632991049230709,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5252 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD59b3c0ebcbf77dede6a9d0572d91b1c2d
SHA13b32a4dd04e2231d1a432e94d88f9554e84f87f6
SHA2561029c28bf4470100755c0771f59cebefef0bef8a9f9b5d16f15211772a9a2511
SHA512c89040155f2b11cc3268874adda1d5a1ebf5f9d229a33de4c56097e7f0fcc058c3bd69f617f35e7742cd23e4b134f3200617951502172432254e0214892aa00d
-
Filesize
6KB
MD571ceb3bd6bc7dfe5e226e5927d65cbd6
SHA1ecbb563c48be5728a67d54f77ad3f8e180e959d5
SHA2565bffe29040016c8b77aacbc0d50037610ed08f3a15e2409f4120ad4be2142c2a
SHA512cace918aa3cb2e4434a458fd8ac4f1bdc007688da2eed3c6ccc9f9ade9013ab028647233a2f94ecf3cf3f3c169b55c4f3d28804199e1b326d2d4dd05e48b30b3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD561d6fdc5c8c0b6eff69949285ff19adc
SHA196bf6bed41d5761617ae3ff3b9864e6e834d6a4f
SHA2563d2f6dda98024473a85c9ecb19b8ea53451c04ef2d7c93a5265e0d51651e0235
SHA51287244d44b0b51ca238f0988e18fe06eaf541851feaeb437dd9884a788727db12ba8c5974053cb0295e5209825fc4731b2494000dceb5770f8ddba94d557efca2