Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-08-2024 15:30
Static task
static1
Behavioral task
behavioral1
Sample
c10a54ad78ecd98b29fdf4608638fb6e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c10a54ad78ecd98b29fdf4608638fb6e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c10a54ad78ecd98b29fdf4608638fb6e_JaffaCakes118.html
-
Size
143KB
-
MD5
c10a54ad78ecd98b29fdf4608638fb6e
-
SHA1
74346810f1a527d6475a743354f5ea3663a78a9c
-
SHA256
218462ae22866a16a4d0f3e3fd56152a33eaa8df0b96d12b2e49323e3dfbe8a2
-
SHA512
0a379720c7c3d811f72bfd394a29185eb1e72337bcb53664b5f53938f184de4e6127a0f264c5edb3cb4ad7cc75ab23228062b13bd73d0d48f5134f7f74746fa7
-
SSDEEP
3072:SUMIocpvrIDx7dyfkMY+BES09JXAnyrZalI+YQ:S8DpvrIDx7osMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3572 msedge.exe 3572 msedge.exe 2184 msedge.exe 2184 msedge.exe 4588 identity_helper.exe 4588 identity_helper.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe 5088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe 2184 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 1608 2184 msedge.exe 86 PID 2184 wrote to memory of 1608 2184 msedge.exe 86 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 4608 2184 msedge.exe 87 PID 2184 wrote to memory of 3572 2184 msedge.exe 88 PID 2184 wrote to memory of 3572 2184 msedge.exe 88 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89 PID 2184 wrote to memory of 4404 2184 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c10a54ad78ecd98b29fdf4608638fb6e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84d6646f8,0x7ff84d664708,0x7ff84d6647182⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,16091710452633338762,130522953113658954,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,16091710452633338762,130522953113658954,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,16091710452633338762,130522953113658954,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16091710452633338762,130522953113658954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16091710452633338762,130522953113658954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,16091710452633338762,130522953113658954,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,16091710452633338762,130522953113658954,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16091710452633338762,130522953113658954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16091710452633338762,130522953113658954,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16091710452633338762,130522953113658954,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,16091710452633338762,130522953113658954,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4844 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,16091710452633338762,130522953113658954,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3120
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD51d0d4895a34c8ab3cd48a7ab87b34475
SHA12648d7e9ccfb70bb8c190060e9c90d79208f80a6
SHA25661f50d32f75de3ef5528855b0b0fd1d303c360ed4f8953001af9f6912978e7f9
SHA5126cfcdffea7972e85dfe8cd3fcd605b1d3d002ad61d2196330b7fc37c72254fb5e13764f4462b75dab9fe76d87f997a748f57aaaac20d889ca83c9017c85b7a8e
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5b33215d9c5e468d38c11c8550099f472
SHA167a1dbda5da71c25e1f23f5c1f5b6839e195f067
SHA25612ae64d6947ee69163f3f942420b8e1d663b0ebac9da5a6da01564909c183134
SHA5127a846c0676728d299ac125ae31469fc31802835b47e45094cb36b57f9a8e875b6872ec481b11103d5a7b7f08cae28d8c8146f23ee47fd72ae4fef14431ae8aa6
-
Filesize
6KB
MD5219395a098acaf61ea36399f61436bd8
SHA17e52fa1f3b8921102bbf708a98e6d5316e12e915
SHA25672593cb5e2def17c21c50a17324c20e385e8c200ca925b4297eec7103f8c8cf8
SHA512ef8eb8ec19cde041154144934eab58537eeac650a2c55f1f8a60d7e251b7c7866dff7908fc7936fbfbd2971ef4fd2251b64ee8d0bd7f7eed81dfe0919fb6d7e1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389