Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
c1e70bab5f0e46f2138a4d6c01e17847_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c1e70bab5f0e46f2138a4d6c01e17847_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c1e70bab5f0e46f2138a4d6c01e17847_JaffaCakes118.html
-
Size
8KB
-
MD5
c1e70bab5f0e46f2138a4d6c01e17847
-
SHA1
a2da231a3a91ce0cd3bd03e52af60d169ff44827
-
SHA256
7bd8e0f472ef3b159e5b5a1bb1cecee7aa3f22394eb90d60b6ccb2e9b18f6278
-
SHA512
cbe0d31c7af67805b78ca50b3f393db5bbe9aa000984cace8d016f3696c81fcf045e3e0bbc91d6d8f60036156d14db5837b5360242624839db55c4abef497cfd
-
SSDEEP
192:2oRg7h3M7phLNCAWSJoHoC4EP8tr6LEuEnCht0VDQVC+kt6+CXzuB1QMgKFvTf3t:sWpdN5D2HNu6LEXnKt0BuktXcMgSvTfd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3088 msedge.exe 3088 msedge.exe 660 msedge.exe 660 msedge.exe 2176 identity_helper.exe 2176 identity_helper.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe 4916 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe 660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 660 wrote to memory of 3528 660 msedge.exe 84 PID 660 wrote to memory of 3528 660 msedge.exe 84 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 2916 660 msedge.exe 85 PID 660 wrote to memory of 3088 660 msedge.exe 86 PID 660 wrote to memory of 3088 660 msedge.exe 86 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87 PID 660 wrote to memory of 1372 660 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c1e70bab5f0e46f2138a4d6c01e17847_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe955646f8,0x7ffe95564708,0x7ffe955647182⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,3549433608021922884,6443857330477194269,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2200 /prefetch:22⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,3549433608021922884,6443857330477194269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,3549433608021922884,6443857330477194269,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3549433608021922884,6443857330477194269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3549433608021922884,6443857330477194269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,3549433608021922884,6443857330477194269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,3549433608021922884,6443857330477194269,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3549433608021922884,6443857330477194269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:12⤵PID:1248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3549433608021922884,6443857330477194269,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3549433608021922884,6443857330477194269,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,3549433608021922884,6443857330477194269,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:12⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,3549433608021922884,6443857330477194269,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4308
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\886a17a9-2ef5-4205-9124-e1784c86453c.tmp
Filesize540B
MD5bfcb28b9ea08f9d15ce28e6b5335a343
SHA1b011c4cdc0bdb747046290d49928483e1b7a2616
SHA256358e2d81a1219659fff8257d7c617a2b4ca18f6a81388126ea9cb776bc9e4012
SHA5127c14648f571aef141bc08153854c07e7e4509682fb232aa7a334b46cf0b4f9e4b264cd39e5d65b62551154849b4bebc8dad2126972d5fb00e646c7cf7a134f60
-
Filesize
703B
MD5c544b3ca5c46f845cc08c9426df116a6
SHA176713192a2be6e48c020188613e34e924beb5aaa
SHA256b3960d511aa856fcc69b6a037313993287738d31a84c09158866470339379045
SHA512ef5673b29d3745e1c258838120a8d06792af48d98410fe5ded5cf0472f44096f374dff8391989dc86d13416fd292249b65f0ae28d4648fe43ecb6212029b682e
-
Filesize
5KB
MD59722ee337fe2f8838e1ed198b550b28c
SHA12104e43b9d3467663adf32b1e088c33ce3f8281d
SHA2567c451008e14424d4552055ec55e7e5dcc7564b6d4908bb6342ee96e2b28c88b1
SHA5127225b4db6186e92a9f35b88875d7cbd3c1c169bbf39747051b4e87510b4b7cd57eb2d9cc551193677b9ab8d66e28d993fe239292b3e4cd555e401d528a19aaed
-
Filesize
6KB
MD5f05c587347a27de15ec932e828c9a84d
SHA1c9c6d7b3aae9ce6c4294b87f1b70b757400e3c5d
SHA256a12e28635c823bb3b112d52236707d07f04cd3c63ceda9f8c55bc4bc2c364d1d
SHA512663d1817fb0f3dbad75fa1b33b1a7e5bbd9866e33b3a1acb76e73a0c858f3a88920616220240f5d749852a4e8fe5116d363747aab6c3385ed7a0b72dba9377fb
-
Filesize
540B
MD554f9fbc5edcb8be303696462027a044c
SHA11267a23b2a9fb2e840c4102b4b7eca6c0bf5c0ae
SHA256534558ce79aeca06f8399c9c6eb8725192ea700cb6e3c29897bb0351b62ea4f7
SHA512bbddad51c176382c6b9ad3190efbd41d9259dce77b9be237f07c43a46f6c1eb860f8c024412c2df8524accad14c972751566095b2d5cc0a38894e1a64fd66431
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD527e23d8f3819983a4f0c7a4c12a95d7c
SHA1950527d2cb6b42c221351e4554fadff1a87fec0b
SHA256d58dd44c5c7832611fbb007adc574b054de1f5d81b3d360ab2b5fe3d6ce8ff24
SHA512772de5da4c82f0dccb8163b7580bec65eceb8d7e9b23cd79ce82ace67eecaef4a60d1a56ee5e383eec23e328df0996743fbd3c13a2a64289695c138e5987942a