Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 22:51
Static task
static1
Behavioral task
behavioral1
Sample
b55d2e55dbfed6221b274c8d455eae50_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b55d2e55dbfed6221b274c8d455eae50_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b55d2e55dbfed6221b274c8d455eae50_JaffaCakes118.html
-
Size
53KB
-
MD5
b55d2e55dbfed6221b274c8d455eae50
-
SHA1
939bec71b42b915903ff58815c5c5b72b5a8e119
-
SHA256
2eb53c91fd291cbe5cc1f013d6b2fe994876a087994f9d7764e7adf3c153a17c
-
SHA512
499364c3e6bfa6c7efe101ee677631d011c7b267497ad4d480137947f76ac2fe9a608bd5c3993b27fb9011528db3487ac4e7cbffd1db5b5c007c988f41b0eb70
-
SSDEEP
1536:CkgUiIakTqGivi+PyUorunlY863Nj+q5VyvR0w2AzTICbbloB/t9M/dNwIUEDmDo:CkgUiIakTqGivi+PyUorunlY863Nj+qq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 1276 msedge.exe 1276 msedge.exe 4888 identity_helper.exe 4888 identity_helper.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe 1276 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1276 wrote to memory of 1464 1276 msedge.exe 84 PID 1276 wrote to memory of 1464 1276 msedge.exe 84 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 1524 1276 msedge.exe 85 PID 1276 wrote to memory of 3472 1276 msedge.exe 86 PID 1276 wrote to memory of 3472 1276 msedge.exe 86 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87 PID 1276 wrote to memory of 3124 1276 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b55d2e55dbfed6221b274c8d455eae50_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf51a46f8,0x7ffbf51a4708,0x7ffbf51a47182⤵PID:1464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2740 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5340 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5412 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5456 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,13247125122580140192,8392543244682455285,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD58cc378c16b58f3cfc76dd4bb673c6ddc
SHA198c388866ee490f0e2d32c9c5f46ca3386ca1a22
SHA2564aa03165d6ef65582ec0553b390902bf6df4f8bf7bc020bc9f22e6fac1eca342
SHA5123508192560e2c42b467f36bed5a0f2828b43a15cb0b2244bfadacf9aa9babb2b228ec5a6a275c72b14255d418de35e5d5914356746d7e728470fcf56a82d48a4
-
Filesize
6KB
MD5035ea0a99b948f666d1c5492a612a9da
SHA1f2ae7db467a15dfe632ea7990886fcb19082b5e4
SHA2562a1627aa93f06944a04c049fb41eae6356c5e1f8c55e8275e39eb99eb6f3684a
SHA5125bdf2d582e85403a25e1b3e0f48efd73b355b0553773da19c242509d54e41131884227d73fdb46da4ddc13d202fc2a3595f9a58eed11b3d6a70c97fb4a7642a0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5da8dd34ddab60e5befefa7ee0c908c2b
SHA1baf616c7760d233665f7ca0e8520c328b49d9468
SHA256e978f5a13f96f9fb8a84d0c3a19d2d4c95eeef852b76ae08956fb2396007534a
SHA512e8b2fd11c66a47790c6fe44e3f6cb335ee6ce38b700ecde9750eb6bfd31ef6a9698edb127ff38c5eed37b43cbecd82555c6598f3acb72faf1e4db63101f189e6