Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 23:10
Static task
static1
Behavioral task
behavioral1
Sample
b56bacbc0c2a68dd33e5cf9b17edecc2_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b56bacbc0c2a68dd33e5cf9b17edecc2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b56bacbc0c2a68dd33e5cf9b17edecc2_JaffaCakes118.html
-
Size
53KB
-
MD5
b56bacbc0c2a68dd33e5cf9b17edecc2
-
SHA1
4bd259ca627e47d3527a122030d324d096b0928c
-
SHA256
91e7ac62c159eb821b22eb951c8e40708c287340071030d8a8a4281a6d170de8
-
SHA512
10227b3df20fc3d1a2ccae744209c3dd91a68f4589de3ad9761d130132d95eb622f29b0e438766fafe0f13c5c45d981b47fcc810ee65c2befe6625c7c5daac35
-
SSDEEP
1536:CkgUiIakTqGivi+PyUFrunlY863Nj+q5VyvR0w2AzTICbbQol/t9M/dNwIUTDmDc:CkgUiIakTqGivi+PyUFrunlY863Nj+qE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3640 msedge.exe 3640 msedge.exe 808 msedge.exe 808 msedge.exe 2452 identity_helper.exe 2452 identity_helper.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe 808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 808 wrote to memory of 3648 808 msedge.exe 84 PID 808 wrote to memory of 3648 808 msedge.exe 84 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 4336 808 msedge.exe 87 PID 808 wrote to memory of 3640 808 msedge.exe 88 PID 808 wrote to memory of 3640 808 msedge.exe 88 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89 PID 808 wrote to memory of 1164 808 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b56bacbc0c2a68dd33e5cf9b17edecc2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7ff82fc046f8,0x7ff82fc04708,0x7ff82fc047182⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2668 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5448 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,11841418911966547157,16120341013044625709,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1600
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD507e01f826b266b4a8fedb714d38d6e2b
SHA1336dfdb96f63eb50287e835a70d5b78ff811bfdf
SHA256d611f1a2647d1ac979139d478bac4b68711413d58f3e1249ccb0e3614ad55bc5
SHA512e2ae8648aa99ad2e3c98e0d97c9e8260005d9456bcf7a85e5dd732367b67aa1e8901a8a4f1c95b7a30f040bf4295baae753fda87c23c623fc8c7ff3454dc1401
-
Filesize
6KB
MD5262e00c3ceeaee3d44b4d0389ebcb686
SHA1526c5a2f87ec882ade16e770b1108e7ac9204006
SHA256f8b56536c738aaba71e2c3a052fb4acd4c3301204aef7604562448644aad6ebe
SHA51225c698555c359c2903c45d219a9eedebe4028444d47fb1ee1bc76291584cbce0429fad976da3dac3567018a34e9f3e0c2bf141c36426e59464b8204bbe1c5263
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD572b9e6ab15e7f5d82669ea3d1d873954
SHA1105710f9882e938ab532a193122c2316a6bddf47
SHA2566a30ea35fa8275d3dfc3385fe91974f752cf87efd13d729b0d210cbc3d802789
SHA512766cfee8c4af2e9af1d4be3e0aedba168a8f2503c406f6f993587c33018e05ec04699922b4ed430b94bc0cda2577960d2969a9b035c35a6412bd8145cf70e60a