Analysis
-
max time kernel
148s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 17:20
Static task
static1
Behavioral task
behavioral1
Sample
b876e9d8ee738ec6f823a5f921ab3a30_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b876e9d8ee738ec6f823a5f921ab3a30_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b876e9d8ee738ec6f823a5f921ab3a30_JaffaCakes118.html
-
Size
6KB
-
MD5
b876e9d8ee738ec6f823a5f921ab3a30
-
SHA1
c65e6d615d69afc0cd1c800ea7fc2fb41234c961
-
SHA256
985aac4f0cf565fa1fef4f35ac16020fab5bb4ba2830088f2a909ca8f4e98e58
-
SHA512
84d050721f56b2c18a2d88fcf25781e54744b56c2f988a84ef9b2c32d04445ad1dc7011d92958a8a88aee4e7e67d6c985699433ec7e6826f77a0608104040bb8
-
SSDEEP
96:uzVs+ux7/zLLY1k9o84d12ef7CSTUO6cEZ7ru7f:csz7/zAYS/Cb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4628 msedge.exe 4628 msedge.exe 4268 msedge.exe 4268 msedge.exe 3844 identity_helper.exe 3844 identity_helper.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe 3172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe 4268 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4268 wrote to memory of 2184 4268 msedge.exe 84 PID 4268 wrote to memory of 2184 4268 msedge.exe 84 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 3116 4268 msedge.exe 85 PID 4268 wrote to memory of 4628 4268 msedge.exe 86 PID 4268 wrote to memory of 4628 4268 msedge.exe 86 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87 PID 4268 wrote to memory of 4592 4268 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b876e9d8ee738ec6f823a5f921ab3a30_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff51c846f8,0x7fff51c84708,0x7fff51c847182⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15279421758313103160,10852653443906100225,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15279421758313103160,10852653443906100225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15279421758313103160,10852653443906100225,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15279421758313103160,10852653443906100225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15279421758313103160,10852653443906100225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15279421758313103160,10852653443906100225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,15279421758313103160,10852653443906100225,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5396 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15279421758313103160,10852653443906100225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15279421758313103160,10852653443906100225,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15279421758313103160,10852653443906100225,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4208 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15279421758313103160,10852653443906100225,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15279421758313103160,10852653443906100225,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4012 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD55086224989ebac8f10a97a914c902213
SHA14f641b12baa7fedc71562842866c5450b8272a70
SHA25630776d807456ace6ebdfda69d4da97e6cbce68f922c3691141a92161325bae42
SHA512a392e0e89da9c5d92accbb660a43c21bb06cf320e0c428fb5bb50799c04cb6fd67486d99135c00b772f55bd1c3d5c0e36628d04d9f2d23caf1af0c63b0870fc8
-
Filesize
6KB
MD5d6ea81b20014a82ea0e32959181ad41b
SHA1988f0150627496b23f27362b5a4ac06241cfbe62
SHA2567fb0c68545811ffcfedfbcbbfbae4bb1c19e60e74bca2bbf0f0e41d6d3604ba3
SHA512dd7a2e0339bfee7514a1749c6445e6439f249b6c45de160df556298a6f8f8ea9cd9bc60232b5f9d0269af116c7d9f9e9b30198310bcffdf873dde4a13129cf39
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57e50e5ea3bf027c51659475ffc54fa3f
SHA11a92e86f6653a5cfe3893705eff1005fb03d3eb1
SHA256a829a50fd45a5673fabdf063a46de9b9f427fc93820055754e99601b5495d376
SHA5123ef66c847740295c1c7cff44e1cdb9fe351ba94ecaf0e916f476ef47514fd8acb1c32cb822529d52ddcb308657c9a517bada12228b0c85aeb56d78ff22798a2a