Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 08:57
Static task
static1
Behavioral task
behavioral1
Sample
cf2a95a06f9574e071b6b3921107025a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf2a95a06f9574e071b6b3921107025a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf2a95a06f9574e071b6b3921107025a_JaffaCakes118.html
-
Size
906KB
-
MD5
cf2a95a06f9574e071b6b3921107025a
-
SHA1
4014d212975bc33d60ea7b241744b0d6dafd759e
-
SHA256
47f55f820473dc9b6f355102269a53976552547700a593d2f8c2f6ad4d2dcee5
-
SHA512
912c6ee9c155ae57b9fc161825e9ff4df1a0bff4206468b8db0cdaa5abf4493a9eaccb26a3cfb17dab6a74595b67d01bb69b2535a5838bd0195f1e22a160d8d5
-
SSDEEP
3072:JpRif2szA0N/Gd7ZXtjgrJldYyVeef0xOMQfw/df2szA0N/Gd7ZXtjgrJldYyVeW:51sM2ldYyYQM0sM2ldYyYQMpo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3692 msedge.exe 3692 msedge.exe 4784 msedge.exe 4784 msedge.exe 3576 identity_helper.exe 3576 identity_helper.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe 3236 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4956 4784 msedge.exe 83 PID 4784 wrote to memory of 4956 4784 msedge.exe 83 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3104 4784 msedge.exe 84 PID 4784 wrote to memory of 3692 4784 msedge.exe 85 PID 4784 wrote to memory of 3692 4784 msedge.exe 85 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86 PID 4784 wrote to memory of 336 4784 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cf2a95a06f9574e071b6b3921107025a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb58e46f8,0x7ffcb58e4708,0x7ffcb58e47182⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5619891887848413296,880928000821640108,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,5619891887848413296,880928000821640108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,5619891887848413296,880928000821640108,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5619891887848413296,880928000821640108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3132 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5619891887848413296,880928000821640108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,5619891887848413296,880928000821640108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,5619891887848413296,880928000821640108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5512 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5619891887848413296,880928000821640108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4964 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5619891887848413296,880928000821640108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5619891887848413296,880928000821640108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,5619891887848413296,880928000821640108,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,5619891887848413296,880928000821640108,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3236
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
584B
MD5e88f453cc25a195283ff231fb55d94d2
SHA1e3b0a075830dda2e5a8dc9e06cab4ff7ba0e8e9a
SHA256bf05e52b0ebc9259cebeaae3b7318b72674f327d0e9b49f280e6b7297daffaa8
SHA5122787ec0a95bcdc90f516e71d0fbccc3ecb892efb190562af7008867d7fb7c599a9ef3caefcbadc0ab6b3bfde11bfd26f8937abb8f8a3b7fadd20592cec923140
-
Filesize
5KB
MD517d046e82fb5d9c18a98b2a4bb1ab696
SHA16e21b4a258ee8ea0b462e16d5fffdcb461e2b307
SHA256c029c9cf185f25ec057515f0024bb9e54d48ee14a09fe3ac6144fccf4fa8ce9b
SHA512e249e5127a17605e34663819c9d20e600a9668c4792a1215fa92604da7d0268bac27c4146f8aa57da86df07aa0d704f18e0738424ce119baa52eb071b2b9fee9
-
Filesize
6KB
MD53a77cf5631d4a72f123a2209ea84399f
SHA18e607c961535dee7fa47e4d9f8166c8450b878ce
SHA256bffab38040bab0408908a771aa0872ce15a28d69c027103ea531a2896fd3e9b9
SHA5123abcd7c827d71965760a413a22ff8429f77cfda4186912ea2b54a02d9d58b781b53114e764d9636381bde9d501463454d40142ffa7d30f293eaeb2ef3844a2a5
-
Filesize
6KB
MD5b555d63f42aa363d745490e645995c5c
SHA1fa10420286ac031d9cd98829339a840cb558575e
SHA256b95c2628160c60f84755339d695a38bd8f2a5ce6cec010fb5bd1db4ce21b9fb8
SHA5122cc023789249b495410de5c42575ec281301427f651414c2e5aa569d8b976b0d59db4e9440806854a69cbc9898d22195541c4d976b05a500d67108f830686009
-
Filesize
369B
MD5c73eab6a083b3c953b6fd5b11a04474a
SHA1a186dd3311ca4fa933e1fdfab9168f312bde4a1a
SHA256a2bc5fb62f05fffc8e81fb703501a94ecde059a97286059f7a5233e1e6070a8c
SHA5128d8a5f93523ec3a66f09d2805e8484f21cef5cd7615eba8aba96479ce5daa255d0e777c9a35dab53109136a28dd0ddff5c6ecc763d89bba941fb3e699e50e9f2
-
Filesize
202B
MD52ecaa6dab0db3a7901b15823b36eb21d
SHA1194aeb9b32e996cb0786304992fe0ac2f59e8eea
SHA2565ded729a9af159a3e0ef2426abb8cff80f8f0840005f1e797fb1250176967cc7
SHA51289fb355f3a37067998ae1286f40647b68cee0b18de08a45d53f4a3ebac77c193e75591056e938b23b75d4902b15e841d9ee94d09589545ef466a037829d30f2f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD552e70c0556362cb21bbe140ad2e6332c
SHA1b9d545bde490617182e9b1bdd170389c97c4a49d
SHA25695338d9c6b4745866cfa8f11f8905e10e6f7a9157e87a107fed59c67c0a1d76d
SHA512047ef19ba7cd5faa7eb8589e10856b82a0b496bfd825db5d1b40a84ff73ec6b1c2a106fc1a43e14fc11dc2a07303f9907423ef9a09605899c9f0cde451e454b8