Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
c14eadeb1c6ec6e31bb4d09b82f26917_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c14eadeb1c6ec6e31bb4d09b82f26917_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c14eadeb1c6ec6e31bb4d09b82f26917_JaffaCakes118.html
-
Size
34KB
-
MD5
c14eadeb1c6ec6e31bb4d09b82f26917
-
SHA1
e197cb0d5a897ca2185509b86f68d8b1bdc3f563
-
SHA256
357473d40fba33e90df891dca1a60e66f0c3d736c277998a871498be3347c6e4
-
SHA512
fdebea83eee4c6bba66bf10e5c84b771a1efc3cab713754e96cf9cdd3b0ec65cb79ac4381c9d5dbf2c3f9180bcadb91b6a5af219a08a3421a794b8d86042b2f7
-
SSDEEP
768:r7EpFwSXe6eDewe7eIeygjI1ECJC3CNChCICrC/CvCPJExBq0Z24HLx8lF7Fn:rwpFwSuDqtClpjIqEWmyP84yiJ4q0Z25
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 4580 msedge.exe 4580 msedge.exe 2976 identity_helper.exe 2976 identity_helper.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe 4580 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4580 wrote to memory of 3328 4580 msedge.exe 84 PID 4580 wrote to memory of 3328 4580 msedge.exe 84 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1064 4580 msedge.exe 85 PID 4580 wrote to memory of 1232 4580 msedge.exe 86 PID 4580 wrote to memory of 1232 4580 msedge.exe 86 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87 PID 4580 wrote to memory of 316 4580 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c14eadeb1c6ec6e31bb4d09b82f26917_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d48d46f8,0x7ff9d48d4708,0x7ff9d48d47182⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,467505910623863887,17352921612592053767,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,467505910623863887,17352921612592053767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,467505910623863887,17352921612592053767,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,467505910623863887,17352921612592053767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,467505910623863887,17352921612592053767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,467505910623863887,17352921612592053767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:4996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,467505910623863887,17352921612592053767,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,467505910623863887,17352921612592053767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,467505910623863887,17352921612592053767,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3980 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,467505910623863887,17352921612592053767,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3012 /prefetch:12⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,467505910623863887,17352921612592053767,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5344 /prefetch:12⤵PID:1792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,467505910623863887,17352921612592053767,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
308B
MD50758b6f6e37c9f1846f8710457097cb8
SHA1b3ce4de2a24ff4e97186d6b37ea0070d317f5751
SHA25687bd795c2497eeedc7728238ab2b45db130abe12b64e68b529d33bded2021ccb
SHA51208f1286e5d77b557ced3a11dc3fb166ab71cc865450a42aabe4b21dfcb8ec80913ec6cfca8ebaffa8fef79571539a223d9b02d303b052b81a53d97fba82e49b5
-
Filesize
6KB
MD5f485adff23d9b1338c82e1b418e98df7
SHA1ccbbdb91ad2eba7147ad36b3a50c0529e699c1dc
SHA256f031599ae31b92418b5288d320a90598b626531cf095f50fcc7e272bdd1f958d
SHA51276f1c1468e7a34d13ff6bcc05987e3370630697a9f493cd3503d063ddc0c0cb0a6e3070f0469f406c91306ca649292fe361652ec688ab6751e7d310dbee54d1a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\fefe47ad-2ca0-4063-838b-560c288bf507.tmp
Filesize5KB
MD598b77f0573ebdc8ab7fee7fd8ed6033d
SHA18a83302f56e2c9318c77f902ad4e27851e1c508c
SHA2568786c56f8829ccca3ca5b4b33097ff74aef56bf3832d72ac666de7371ef9aa56
SHA512bb25c7302ccfc03f6218f60618a9d40eaa16669c86b3433e0e9aec53a09efaa72fa32a90cfb43073a46b448a6a5d9102a1c57b88e2f5f40f6960e01ed859e029
-
Filesize
10KB
MD5940dca8d11f0c57d59cb2ac6bef65849
SHA12cb1d3d9dc4ec12fcc899ff8341f7a46cd7efbd4
SHA2560fbecca1e2ea7be46c86ce35d3a096e1c449495b352665dca05d02736c72d3f7
SHA51267a1ee49e30a5d6f3a6add1494092e41e9a8448256a7051489f6569f8dfb0b37c51bae2f552a93d85a3cd01e15f3445ffa4523fdc7cc898d2c22e1fdd61a74d4