Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 18:20
Static task
static1
Behavioral task
behavioral1
Sample
b48726c7de8a0921528cd8bfe63f16ba_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b48726c7de8a0921528cd8bfe63f16ba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b48726c7de8a0921528cd8bfe63f16ba_JaffaCakes118.html
-
Size
37KB
-
MD5
b48726c7de8a0921528cd8bfe63f16ba
-
SHA1
3ceb8b740d624da2cc50e9da418d4ff2853e3d4b
-
SHA256
61a38a4fb1c7f752ec5723374a06954ab02ccd420885dfe98d6f1e3704b2feae
-
SHA512
b044ad33e511ac1fec2c6974d72c314b4f403fb4d96ae8a2fd974a65714de5d10f05dcf5b3484c62fae7696820bec016e31db3ac5667db1649dd1f124831f1b2
-
SSDEEP
384:1Q/SPNGzLmZCv+2H6uV/OOhXKkCnz96tOh:wLmZC5KkCnR6tQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4004 msedge.exe 4004 msedge.exe 436 msedge.exe 436 msedge.exe 548 identity_helper.exe 548 identity_helper.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe 2772 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 436 wrote to memory of 2564 436 msedge.exe 84 PID 436 wrote to memory of 2564 436 msedge.exe 84 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 3616 436 msedge.exe 85 PID 436 wrote to memory of 4004 436 msedge.exe 86 PID 436 wrote to memory of 4004 436 msedge.exe 86 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87 PID 436 wrote to memory of 2252 436 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b48726c7de8a0921528cd8bfe63f16ba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6a6246f8,0x7ffc6a624708,0x7ffc6a6247182⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16525423029413821074,8408132775281596389,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16525423029413821074,8408132775281596389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16525423029413821074,8408132775281596389,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16525423029413821074,8408132775281596389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16525423029413821074,8408132775281596389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16525423029413821074,8408132775281596389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16525423029413821074,8408132775281596389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16525423029413821074,8408132775281596389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16525423029413821074,8408132775281596389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16525423029413821074,8408132775281596389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16525423029413821074,8408132775281596389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16525423029413821074,8408132775281596389,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD5f76cbcc701812905091a4e94f90a387f
SHA1fd2b7ae7f8bd7af9d98353e06f0eed9bc604abff
SHA256c73c144d688eb1acfeb9f331f6dbcda4f0ad905d4d360ade10c5f548967ee72a
SHA51257e945482a5c06950a2fa89a2a1bdf8027737ba3e2d383cc135041a63ef14aaa92381459d3dc6b20b76134e68353ecfc61248971b5d500de6d5bb92a8a1b0f30
-
Filesize
6KB
MD5772a9407cba1f874b6a896874102858c
SHA152553742fcc03576e1ee7eefc36ca73da98ebe9c
SHA256a878d1d2a91019445d0bc7400311d17f6b9e7fc09eed2223c1833b987c9fc879
SHA512265d5c004e6c45d7f39ffc0195dd876fe7ccf1dec15bdc7a6e1a0c37e7edfb981212e23a6bda9646c1252542a8b7f246dc059f39ad56d10a6446c5836ad5303c
-
Filesize
6KB
MD5ff1d66fb50c10de4754c337ec1f79b00
SHA1131b4419332279f9e810d2b337043e5f07ccd19f
SHA256780e0b753bded8e404f05a0af8ee7a8a76cdaf2ed00d94a874a4a8bde3c55a64
SHA51223b9fc50a4bbbc7c074052e112587f581be32b811ba61b5baf60ec9d54ed99ed38792ab3f8a07402fd93e23c6172b6e46b1e9030685a728a33fed1e17e09a106
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58b1157f7dc1e99c436719a2bebea7f04
SHA17ab331a2c5001b8f968081415482607a10ee6f98
SHA256505720b91d9bfea974178b26b4788a0ff450d5751a33a5df426ac41d081a9033
SHA512f54b58dc04ee4ed7d7c0ea38fa3f711545633b574cedf34478f847331338ba5bff2df610a84989855987e5f771c7d68c11c3d283a02327c91158a29b60850aa2