Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 01:39
Static task
static1
Behavioral task
behavioral1
Sample
b5dc17a1fe2039c2f85acbc12d670d2a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b5dc17a1fe2039c2f85acbc12d670d2a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b5dc17a1fe2039c2f85acbc12d670d2a_JaffaCakes118.html
-
Size
56KB
-
MD5
b5dc17a1fe2039c2f85acbc12d670d2a
-
SHA1
943d26f9b986288d9b11513b9d9b953536426cf3
-
SHA256
a585ed8d66754f12b9a62ee317846cb09f9920cab8205eb4ba8e15c39361e7c0
-
SHA512
95796f2eb84f3214cb7074f8129a8dadb596b8a91bdbd9ec2e88dbe04c910a6d9fe9ee26543efe7c0feac806a97673e55e548b0c384f6898a6c0cda388353f75
-
SSDEEP
768:o7jIhRNZBGdVjtcSDZyPtd/o0ubnw15PrPNHHwABRFq75bMBrwd+R4tS6DIC/qwv:o4hR5Gd5Atd/o0ubnw1LdRF/e9D/uI
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1732 msedge.exe 1732 msedge.exe 4424 msedge.exe 4424 msedge.exe 532 identity_helper.exe 532 identity_helper.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe 2364 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 1412 4424 msedge.exe 84 PID 4424 wrote to memory of 1412 4424 msedge.exe 84 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1436 4424 msedge.exe 85 PID 4424 wrote to memory of 1732 4424 msedge.exe 86 PID 4424 wrote to memory of 1732 4424 msedge.exe 86 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87 PID 4424 wrote to memory of 1004 4424 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b5dc17a1fe2039c2f85acbc12d670d2a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff815d46f8,0x7fff815d4708,0x7fff815d47182⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2380 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5288 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1729695125990042302,3439334413759527887,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
303B
MD5525b521f3725772c4639bf1f0bd05d8a
SHA1be52337fc03bbb89228d29a1acf882df2dadbb00
SHA256c0fee79e61fd610a2ebcbc7a44127d8327723593934f67fdaa8c17eefb06a772
SHA5121f7d4cf15732b04211674fffbd7ba93ac0831661e2694c646f1506bb6d9f92e212883ad43e19f5162ce0d9e4343633b8793e6ba2cd9e962e52ac518da8f9a695
-
Filesize
5KB
MD5b0882c90b15f01662d2c6100588f76f6
SHA18843754b5467df71bb65ff495147ca368f12f7e3
SHA2562728e2269d537bf307dc6c59fa9cd1d77aef51bd63fa43b8f328d31c3d572119
SHA5123fb758385d967069be21b51f79d6a8d19c0fe708411880b51a18d942be342d446facd94ea4c4f0b3312efa673c2a33f25ee2ae0b85193769a5c5c10818f3aa69
-
Filesize
6KB
MD57a072814f30370135be6ae330cbf1583
SHA1aadea84bd62fab66e9d34036b64e80c314ac3c7c
SHA256403649d29d7cf0a4af97eaa81e330430d8e85a1bddee832dc95d37655ac4a08c
SHA512b36b698e894cfc1ceb31985413af161aee34063513151bc18921d6be162fcb697ec37b39ff6c56ffaf022386997caf867125c667e8247b9d43fbc6327730fa46
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5002029e291479f71419b21a1ff7c5976
SHA11bca9ec9f363e69accf4bdd366465c0f7dc0dab0
SHA2562f654268638545f81fd1447ae98a23bbcee87c99f74259ffccd9b2b6b41f33b8
SHA51213478cd84632da262ab4da603973af4a5e6f9d8779731b26014e29602ca892cf442bfaf79c048711a73d6582e64c3d033ee29ade6e6453b06bbf12d3f80ad180