Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
c02e7a44a9ea1889e0d05bea8b0cd69a_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c02e7a44a9ea1889e0d05bea8b0cd69a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c02e7a44a9ea1889e0d05bea8b0cd69a_JaffaCakes118.html
-
Size
27KB
-
MD5
c02e7a44a9ea1889e0d05bea8b0cd69a
-
SHA1
97fc812a9e8a6ae83f7248b7593a280d1c3fc76e
-
SHA256
401423d95bc10154a5e17f8015e491e459e6614415270d0ff311aac0afb72750
-
SHA512
156aa840b20b831c628efb895c4ec58aaabf0010ee1fba027059cc1898348c0e82e395a83bd351007419bfe367c7bcdf8fe19bba2d7d7fa5dd2c1457c3c0df61
-
SSDEEP
192:uwrUb5nUenQjxn5Q/vnQieWNn+nQOkEntdxnQTbnBnQ9e0+m6uJCMQl7MB2qnYnX:pQ/2t2gCHSgJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5088 msedge.exe 5088 msedge.exe 556 msedge.exe 556 msedge.exe 4212 identity_helper.exe 4212 identity_helper.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe 2688 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 556 wrote to memory of 4252 556 msedge.exe 84 PID 556 wrote to memory of 4252 556 msedge.exe 84 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 1592 556 msedge.exe 85 PID 556 wrote to memory of 5088 556 msedge.exe 86 PID 556 wrote to memory of 5088 556 msedge.exe 86 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87 PID 556 wrote to memory of 4568 556 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c02e7a44a9ea1889e0d05bea8b0cd69a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9c6946f8,0x7ffc9c694708,0x7ffc9c6947182⤵PID:4252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17381320349451619329,17030486383744997141,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,17381320349451619329,17030486383744997141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,17381320349451619329,17030486383744997141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17381320349451619329,17030486383744997141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17381320349451619329,17030486383744997141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17381320349451619329,17030486383744997141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,17381320349451619329,17030486383744997141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17381320349451619329,17030486383744997141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6092 /prefetch:12⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17381320349451619329,17030486383744997141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17381320349451619329,17030486383744997141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,17381320349451619329,17030486383744997141,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,17381320349451619329,17030486383744997141,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
6KB
MD57ca7c28bcc73b6e06055259d1b291574
SHA1e7b3156cf1bf80831275bd7458f0626935788ca8
SHA25683929886cbf4c0c3401e5c1b4fa5ec52ff23009314efc55df9f701bc470fafd8
SHA5122cd148e9174c4f86e2cb56bcb0b747c4b4f422c4d9d22289dbd3d6b2d0a6e3a9b43d4501176c92d9196c86efcb246d810e1c6917ec871d1de7bab2b05ccb5a20
-
Filesize
5KB
MD5c3edb22c6c5591d53f6800a2f2f2c39b
SHA11f64be46fa6b5ed48a4f410a81b52874b7538103
SHA25676cfe73ee0d7713ced906f5b64aede7366136a246c132f6a5f26543edeaeb48a
SHA512e24ec6e66e8a17bd6094e502ab39edcaf957564e67d8990ea92e12dcc8f81faf6bd30bf4cf7dbe965d601ee7515bc9ffafaa4c94e2717f9193e63b7bff936386
-
Filesize
6KB
MD5317d8752ba7f5da1e989b8b67097ffef
SHA1685ad05d6d49e2f62b791119f65e85b143227246
SHA2563a85ded50af85e7920b67db09023439cd3caa3ce35568f142674e9ecacd43d8b
SHA5128edae0c8754d1f1dbfe9c6dfdd2abc0843c66356f8c01cf847e2f0bbe84f62d88ca5993384b27947210a5c46ba108f9d416388afbd9b068516cd24158750572c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fe8d5ae24976d70362f60efce5eddfd3
SHA1c9b3993d94c0b2f425cc237b0d7324bc7ca6bf55
SHA256010483d6732b2da744b6f2821ac518113bd634b0933f61999ac32c2aca34ecb1
SHA51268eb0fd9c603d2636e4208a77b91f26ea95a73ff2cb7bb2072c52e3d583866d518901cfa4a9eb44e3929172b5d4ea3fddd2d7cd07159a3500826dc71b0b8268b