Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
b596ceeb8718d2e87301ec3bcb263b81_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b596ceeb8718d2e87301ec3bcb263b81_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b596ceeb8718d2e87301ec3bcb263b81_JaffaCakes118.html
-
Size
121KB
-
MD5
b596ceeb8718d2e87301ec3bcb263b81
-
SHA1
8f37d189107c031a661cf2e4a51a5063fba66843
-
SHA256
32bb4948396eeda76441d0587c75c93766513da315dfb835b9e8517bd1fc84d3
-
SHA512
9b2a5fab47f047fdd4fad6f59646f52c91ae213ea2ddc091f7e37e1619e3a37040d270f36f70d9b7d67df4a5e79a916f51958b66e1dfae4468e168523e5eab41
-
SSDEEP
768:txar1DROu5vTNDO4MQIvqNHgrNx8wBoPtXj4aPr7m3uOlap55imPTFKyyDcc:tg5DP5XMQIrH8V94S2eOO55imr0yA
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 920 msedge.exe 920 msedge.exe 4740 msedge.exe 4740 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe 4740 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4740 wrote to memory of 2012 4740 msedge.exe 84 PID 4740 wrote to memory of 2012 4740 msedge.exe 84 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 3604 4740 msedge.exe 85 PID 4740 wrote to memory of 920 4740 msedge.exe 86 PID 4740 wrote to memory of 920 4740 msedge.exe 86 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87 PID 4740 wrote to memory of 1836 4740 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b596ceeb8718d2e87301ec3bcb263b81_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb34c46f8,0x7ffcb34c4708,0x7ffcb34c47182⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7163176672287075174,5725653574711128886,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,7163176672287075174,5725653574711128886,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,7163176672287075174,5725653574711128886,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7163176672287075174,5725653574711128886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7163176672287075174,5725653574711128886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7163176672287075174,5725653574711128886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7163176672287075174,5725653574711128886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4296 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,7163176672287075174,5725653574711128886,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3492 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,7163176672287075174,5725653574711128886,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5daf2be4173b3b76daa8f40e5f26ed2a0
SHA110275dfddf14f761f77c8080d256a3228be4bfbc
SHA256e13f8d450bd2de5ffe2a98bc6d05e85f53c29c2926ba9e8adbd400141581f78d
SHA512ec70fed13b48ad8e70782221e9ff2db198308745e28bacbfcd46c73c08e6d79dee77a2f0be6facf27576b90f523620a0022d4c7cb8c94a2dc64a52096002b744
-
Filesize
6KB
MD5ce9b5177d71508024f5a9f1a98672536
SHA10a3c11b6d4aab43b59c4dc9ff6b50e3522ecb624
SHA256f833cd144d2f2d889e6e867b99562744745493de3e6f06b5383807e2b3093c3b
SHA512d892cefb7eb55c2dff3e5c599cb237518df760701fa0765c3fbb4491addc32ed188146bd00a20f575ddde9158ad15b5dcc3ac04fccb868699fe940c0090e1e6b
-
Filesize
6KB
MD51caa3286b487e017785b5315359e7c19
SHA18cc6b65460409960b06b696b9e7430267221ee63
SHA256cda9908136ee97364c013a541a98fa4c76a138d15a815cd1bd11638d46b98d19
SHA51253e8c06dbd9e756d5d684971ecc3d015c4a0906a9dd10fcdae2a0454a80bf52c8912b814348a91b46bcce05de9edc1b988600b75b21b7132e15e14d5e0f7eda4
-
Filesize
10KB
MD5381be6e7db0f1c3c77f7ec76ce95d871
SHA1604d202e1022ff1f92588f7998ab9387baf97f79
SHA2564932b2354ef2e4045a244727841079efe8fdf80ee6aeccc94f307425eca46d5c
SHA51227259b8d86fd002e966384e487f1c0e1c7ee1e129a27e2768bda18420f91c45d11330950d82588f3f06071eedd72be6bb484c3e1ecd9e7bcb67457b2ef25ddef