Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 10:57
Static task
static1
Behavioral task
behavioral1
Sample
cf63d1b7b4e00dab2f1e91b078e0585d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf63d1b7b4e00dab2f1e91b078e0585d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf63d1b7b4e00dab2f1e91b078e0585d_JaffaCakes118.html
-
Size
36KB
-
MD5
cf63d1b7b4e00dab2f1e91b078e0585d
-
SHA1
ddea7cd4f97d98ca02ae65b9b50fa64f4672d4ff
-
SHA256
0227969a729e939b12f43e2115f71bcbe518fb8dd157ed95acde0e1f9f6d4717
-
SHA512
37658c5e26a4fa58010a44e325d8a117b91d9d10b9976be1c9772995c3b7243d7cbb24377063d00210f2343ae48f2601f6bdf06d54e613ead781de56a696112f
-
SSDEEP
768:zwx/MDTHXv88hARRZPXAE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6ThZOg6f9U56lLRW:Q/rbJxNVNufSM/P8nK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4604 msedge.exe 4604 msedge.exe 700 msedge.exe 700 msedge.exe 736 identity_helper.exe 736 identity_helper.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe 996 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe 700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 700 wrote to memory of 2100 700 msedge.exe 83 PID 700 wrote to memory of 2100 700 msedge.exe 83 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 1788 700 msedge.exe 84 PID 700 wrote to memory of 4604 700 msedge.exe 85 PID 700 wrote to memory of 4604 700 msedge.exe 85 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86 PID 700 wrote to memory of 4588 700 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cf63d1b7b4e00dab2f1e91b078e0585d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9e2d446f8,0x7ff9e2d44708,0x7ff9e2d447182⤵PID:2100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,4787202149172205053,8056980134404556678,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,4787202149172205053,8056980134404556678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,4787202149172205053,8056980134404556678,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4787202149172205053,8056980134404556678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4787202149172205053,8056980134404556678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,4787202149172205053,8056980134404556678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,4787202149172205053,8056980134404556678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4787202149172205053,8056980134404556678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5356 /prefetch:12⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4787202149172205053,8056980134404556678,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4787202149172205053,8056980134404556678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:3184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,4787202149172205053,8056980134404556678,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,4787202149172205053,8056980134404556678,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5432 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2200
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
614B
MD5d34822fc9623ce2dc5f617944d237e12
SHA1f245aef2d48384954cab0b9f92d341ee8af4c35a
SHA2569363673064761d24a9dd48827eebfbc3caf3283daa9bd550e300e7129f24086a
SHA512839d231e202e0889751a7669b98e4b55357577f29c3bff48e1c97d0d1da1aebeb3314502849a94c235e66816d4125d2df4e6a8bb79f7cfc34d3dd5b90af55cc3
-
Filesize
5KB
MD5bbb7b4de1c4902dd54f09a6e45257f50
SHA10af9b271a476a7fc2df9e298e5cef7e58809184e
SHA2560cb5cbaec8931c06c91f0130062e62d10ec01459024b7c610e9a80160d7ce80d
SHA5120404725ec181b02f4f68d8da2200909a1d53e55fec9777a2b24a7a43581d4630db3407367f12f01469460e6e052a40b1814a85f8aa896b4f56bd796b6cf4cd3d
-
Filesize
6KB
MD541fb5e05d8a1f21213ab074c3ece4f66
SHA12116f3ea98ae1f3d2cdde5915e1519fa403555da
SHA2566b7688ec9611d2d563e013b3f9a8689b5b9390f4aa7c595c386a8b28bcac12db
SHA512aed8b3d62c89bc2fb0429ccd962bd2f69d60585a386b0fd6ec5c0384613de94fed0f922b944731f0e076766ee9ba15e873aaa40907ea29e1c81a0e0cde096b28
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59fafc073251b6b03d7dda842dd428a74
SHA1cc5d4348e44469836693e566b326e6c410f5f8bd
SHA256f481d23d7e058054244e6e4ff7aa1e7cc50bdccde89c2fa3e7135d79405598eb
SHA51217ce3cdfcb935fba62ce32023f2de5742ebf0e9d8335c8247a072c4aab9c25d016c2b0d7d5f37a3b2fb8014c3242d7940ae952abaff8caf66102901ae0ba8a48