Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
b797ddbad529026d9c96c02eccd1d1c8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b797ddbad529026d9c96c02eccd1d1c8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b797ddbad529026d9c96c02eccd1d1c8_JaffaCakes118.html
-
Size
9KB
-
MD5
b797ddbad529026d9c96c02eccd1d1c8
-
SHA1
4138538dc9184336ecdf09e52522d630cf9d87dc
-
SHA256
d0fa266ceb7dcfb929da472000ce50ef49b5ddaf9a92092c4f2c5ad9f0197440
-
SHA512
38713686a8586056386239c3118abc2239cd6dc7a60fd438802b224299b719efc1b4592357c6f5b281fbf25f2320da0ee30c93066cb69400942b73cf0bb7d84a
-
SSDEEP
96:uzVs+ux7qdLLY1k9o84d12ef7CSTUMGT/kd6pNQlVHcEZ7ru7f:csz7qdAYS/FONQPHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1708 msedge.exe 1708 msedge.exe 1848 msedge.exe 1848 msedge.exe 744 identity_helper.exe 744 identity_helper.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe 768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1848 wrote to memory of 3324 1848 msedge.exe 84 PID 1848 wrote to memory of 3324 1848 msedge.exe 84 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 4412 1848 msedge.exe 85 PID 1848 wrote to memory of 1708 1848 msedge.exe 86 PID 1848 wrote to memory of 1708 1848 msedge.exe 86 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87 PID 1848 wrote to memory of 8 1848 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b797ddbad529026d9c96c02eccd1d1c8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff93cf746f8,0x7ff93cf74708,0x7ff93cf747182⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14196829509126332157,280803584020672227,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,14196829509126332157,280803584020672227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,14196829509126332157,280803584020672227,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14196829509126332157,280803584020672227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14196829509126332157,280803584020672227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14196829509126332157,280803584020672227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,14196829509126332157,280803584020672227,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5164 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14196829509126332157,280803584020672227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5236 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14196829509126332157,280803584020672227,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14196829509126332157,280803584020672227,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,14196829509126332157,280803584020672227,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,14196829509126332157,280803584020672227,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD589ebc5e3a60ef27576274c7bfe4ab7e7
SHA12546b40a805f87577467713c7307a3a65f1ff4fd
SHA2569fcc3a2f9319ebb32e757e4403fd5530076a69dc0bc7e696e658b3566ef1d58e
SHA51272454baad9b36f58fa4f4d2ab6bd6dd535e2a35b716012e7fec1c858236be795c3a9c2d8b533ad61e2e7dd2ad1bc7764e805c44add392f1f475108ef375da0a0
-
Filesize
6KB
MD59c0efdb2a6446786a8c8cba397363b1c
SHA1653221a09c68b4ca4e24afd0df43b73fe3dcd31c
SHA256d17a216e8bf40d52b249fad7aef110f0de44dd6aa48823d0654f7e50494d417c
SHA512fbb4f5fd5e9efb3e9f9656e99582690ce3d581c582a875555653ba03823f8eba55b2dde891af10b8371e2ec94524f8d203b096128a182384061ab6de83a196da
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD542671550cdde641d9908a9ae5f0d65a9
SHA1ebea19b9028b5c809d13edd61f33571d4d413944
SHA2568fa3f18952ec592793cef6912a8b2004f92f1c84c01323692924a797f7c69c03
SHA51297e140b788063eff7c7bd042de93500aebc598376a2ccc37e11d5282c9eb5a372098cd61e9f2adff7fe4aa3537148366f823bad499818c39df1521885631f0f4