Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 00:01
Static task
static1
Behavioral task
behavioral1
Sample
c7e20a524aecc44b10e9267f87a7eecb_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7e20a524aecc44b10e9267f87a7eecb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7e20a524aecc44b10e9267f87a7eecb_JaffaCakes118.html
-
Size
56KB
-
MD5
c7e20a524aecc44b10e9267f87a7eecb
-
SHA1
221be664c84f5643e6c4a7fca140c3b7ae81ede2
-
SHA256
0d95fbf195e1b32d0ca6ac52e403af04105bc14290185d94d85f57d78b0766c1
-
SHA512
d76bb1dd16ae58ade1a8a67af98214113fb45b50218e53050a15f2eb9803e89256f81d2d6e7e9b9f1d2946a95d99d8cc53d6569f28dc7e413c8e58283ffa94da
-
SSDEEP
1536:BaqsgDLSuSbJGvF1cIcNr7ie2/1PW6aTRaTRpwUMdbzq2OHNdUQgBnCr5o5vFMYq:gYDLSuSbJGvF1cIcNr7ie2/1PW6aTRa1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 244 msedge.exe 244 msedge.exe 4644 msedge.exe 4644 msedge.exe 736 identity_helper.exe 736 identity_helper.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 4900 4644 msedge.exe 84 PID 4644 wrote to memory of 4900 4644 msedge.exe 84 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 2712 4644 msedge.exe 85 PID 4644 wrote to memory of 244 4644 msedge.exe 86 PID 4644 wrote to memory of 244 4644 msedge.exe 86 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87 PID 4644 wrote to memory of 2840 4644 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c7e20a524aecc44b10e9267f87a7eecb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce26946f8,0x7ffce2694708,0x7ffce26947182⤵PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2300 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6136 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5616 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4724 /prefetch:12⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5944 /prefetch:12⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,13080804764212449061,14513632405805420172,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\29bda41a-a713-4951-84af-dff416d16560.tmp
Filesize6KB
MD509bd2b883a5c8b0f287e297ad8925c56
SHA16213568429fb3891e21e8699c005a42bc71a8b2a
SHA2569835294a80528f78629de1e5509b34472639e9bab164f710d4407861db96d00d
SHA512b96af0034dbddffb1a1395c6fffc23a856d5b30ef6681a17142d107c6a9ba93f5834265976b2d78e14606dc6d12f852107b62cd78f37bd69a4b8824a1ab576e0
-
Filesize
1016B
MD5571b5a6434a350e0d8a7113aaf18084f
SHA19d87911df7c41a97781c6264fb3939b086df74db
SHA256d5a8a0a802f21b7033ae5b4b4d538639bd33349a2280fd6e012b1bdaf33a54b4
SHA512874f39eb682ea2c7834c0dba7327e0215ccc229c088c1201ffc9268af516ecda922dde648308ea6511e7d03057c3d47d23823043b5e2185fe1ec2f7921ec25ce
-
Filesize
5KB
MD561e689aa3b51167f642b470152d8086a
SHA1a74962de90f89a730dc9e88402b89567b9416a4b
SHA256790907bfa533cacb31fb5cecf138d23e143e4abebdc60e04ba5dce25214d27a1
SHA512067d5ff5173047034ff04a14f023ab51c5108e96d1644f43efa56d082cc25357be70b81bedd0f59c8031a92404545ed8d0ccb478c0b02c6f782a656b36a4e453
-
Filesize
6KB
MD5f90d5eaf47d1ece53782b8f9014e171a
SHA13530720b526faf66fd2dd1228e8b8a1eb670f212
SHA25627cf4de7eba9d9f0dbefca52c51269a92579a0ddb54105b6b8f0017968b46b2e
SHA5121fad6cd70fe5e29f47f5bcdfcf52eef682df8ef13c1de3b1676844318cbbb8b13d96d10e2c1123b70eb8e464bbfb0685b232099e1a46f0e1afe0a19e40efae97
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50fc1de09b3637f7c0e48f937faf8567c
SHA1e7aa3f7b20145caffc04a7877b3151135f11d1c4
SHA2561e22b50735a2c289fffbcb6cbe6ad957256d9dcae9f08d6061fd8c024d864169
SHA5128fd778b185cc03863f5d113fe7d9af2eaf62c73e5682428b3fa64090dbc323c32e0517581bb7e9e7537cf977633ce8ab0f2459b938b6fa0d8225b51a8a7ea0d2