Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
b9c8f08985c9a2f2ef488b0516dde4a5_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b9c8f08985c9a2f2ef488b0516dde4a5_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b9c8f08985c9a2f2ef488b0516dde4a5_JaffaCakes118.html
-
Size
122KB
-
MD5
b9c8f08985c9a2f2ef488b0516dde4a5
-
SHA1
acb3fae7b040417bfd6450c5496650e0d1138dd2
-
SHA256
6236ad2d8ca8960b38c657275ea88be8fc8395f6991186f6b0eda327c0f3af34
-
SHA512
1358209eeb3e46dcfc882f6ec5084fcf53866776da25843615b179eb89fd4f5e63ed58bef927c6f72843d6473ee97a2451d8f76b55d708e2738d15697c8982fc
-
SSDEEP
768:rDxwbnV3Upzv1Yua5vAlNBIerI9qvnmM7u23J4ShAp3CbVFJN:nyDFc9m5qGwnmQu2Z40A3CbV3N
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5004 msedge.exe 5004 msedge.exe 1484 msedge.exe 1484 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe 2888 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe 1484 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1484 wrote to memory of 2328 1484 msedge.exe 86 PID 1484 wrote to memory of 2328 1484 msedge.exe 86 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 4808 1484 msedge.exe 87 PID 1484 wrote to memory of 5004 1484 msedge.exe 88 PID 1484 wrote to memory of 5004 1484 msedge.exe 88 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89 PID 1484 wrote to memory of 3104 1484 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b9c8f08985c9a2f2ef488b0516dde4a5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3b9b46f8,0x7fff3b9b4708,0x7fff3b9b47182⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12424947008569151939,17470638695656152458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,12424947008569151939,17470638695656152458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,12424947008569151939,17470638695656152458,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12424947008569151939,17470638695656152458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12424947008569151939,17470638695656152458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12424947008569151939,17470638695656152458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12424947008569151939,17470638695656152458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,12424947008569151939,17470638695656152458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,12424947008569151939,17470638695656152458,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD50580d830c7b01a1fba43a4318a700873
SHA136d11b7ab893d441fafb202e1b7dfe0d4215d417
SHA2562380a5aafab63a71759ac30deb6ed1339bbaea8ea53d390122b7b76ce6a32584
SHA512d3397f0308f17704b6a63453d4abfb0a98a266fba0b488e56b806c6f748de55c1b3459f7694185999d935cc5727eb203c6133e8fe6e52b3a91a6e758b46e0003
-
Filesize
6KB
MD52be9473928ba9528545c7b0f0385f1b0
SHA161f6b3bf111b1106e7e0572ee4d9e234b42a89c5
SHA2567bd37d939afb5a4bfba4a5fb93feab591a918c69fa40d0f07dd235b090ec3b44
SHA51245aef38be048a3f1b9015e2921e3cd9d923322cfb88e171f18821692f1fcdcd466bdd31352224c775c3e5a5e8c1186e14be179a6a6b43f47cda192422de2b7c8
-
Filesize
6KB
MD5f30ad13cccd8a752247013667fe7a844
SHA1c2aaf0a5efd5c0cd7772ba93da660d3c876bcd5e
SHA256aa13a12ffdc22199ac8f74afbaf5afdfb55f97f6480ed18cce9e9f0dcf358393
SHA512f8c00ae952067b20063a3c0f6ad860248b278a5c7ea7253a687e506ddcfb3595e1be450c791ccfcd344d079cbb688e732933877cf80a0092cd7428d963f2fc62
-
Filesize
10KB
MD5149331997f46b08958836b5024d6fcfb
SHA109e976ed2d3a18a1bf5a6584311f7eab7106aa62
SHA256d2ad41d92a4092a1c5cceb80f775efe6a2f94996a54e9bbfcc1c3687c14c7dad
SHA51246a2d033865af82fbcc44f2977580f9bb03a9d1804aea65e7c6a479c281d84021b87f02ffdda0ef38d12b63c58022b7c5181965eeca7d10b813f152da69a378a