Analysis
-
max time kernel
145s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 10:41
Static task
static1
Behavioral task
behavioral1
Sample
cf5be9424ab466506b1924772bbe2817_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf5be9424ab466506b1924772bbe2817_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf5be9424ab466506b1924772bbe2817_JaffaCakes118.html
-
Size
344KB
-
MD5
cf5be9424ab466506b1924772bbe2817
-
SHA1
b6222cc46df2805f5628fd40d5ff92d3845f4efa
-
SHA256
91e10b18d5063e3372e8071dcc2aade2d2c140bbfefad002a6c35b0f8b7143fa
-
SHA512
337da81c37e6232e38d98f8d55989e30243295a9efe742de61640a267c2cfde789acac79e9cb4e1d7f2f2aea4c2884aca8435303addcc535874c8f21055d4ab4
-
SSDEEP
6144:S/sMYod+X3oI+YoIddsMYod+X3oI+YrsMYod+X3oI+YQ:S5d+X3Jp5d+X3F5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5096 msedge.exe 5096 msedge.exe 4792 msedge.exe 4792 msedge.exe 1504 identity_helper.exe 1504 identity_helper.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe 5092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe 4792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4792 wrote to memory of 1128 4792 msedge.exe 83 PID 4792 wrote to memory of 1128 4792 msedge.exe 83 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 1152 4792 msedge.exe 84 PID 4792 wrote to memory of 5096 4792 msedge.exe 85 PID 4792 wrote to memory of 5096 4792 msedge.exe 85 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86 PID 4792 wrote to memory of 4908 4792 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cf5be9424ab466506b1924772bbe2817_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6c5646f8,0x7ffc6c564708,0x7ffc6c5647182⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,7872709761668663939,12177003344499511564,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,7872709761668663939,12177003344499511564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,7872709761668663939,12177003344499511564,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7872709761668663939,12177003344499511564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7872709761668663939,12177003344499511564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,7872709761668663939,12177003344499511564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,7872709761668663939,12177003344499511564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5060 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7872709761668663939,12177003344499511564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7872709761668663939,12177003344499511564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7872709761668663939,12177003344499511564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,7872709761668663939,12177003344499511564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,7872709761668663939,12177003344499511564,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4548 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD59ef91519229c74ea092b5c2058177e0f
SHA146b51f02f2fbb692fc37c7fcf18ec951df23c24c
SHA25687eb034502e69ba57c72acc5fded5b4f860d96f9a0235959f470bb80a34617f9
SHA512a7548a430d8d1ce0fc3fd4ed443c3761a1fabee1ebd39eb2fe48ab1b959eb41282ededf25255008dce65f0eec060bca432b1bcccdb1edd981b41b7fec6aec59e
-
Filesize
6KB
MD54d6de739c87e0aec6562006fa936c7f2
SHA1c763da4dcb3e955f0052d019a6c8d1fd0c9005c2
SHA25642aa81ac68f80186fd6fda3db1c398f85afc7876e3a5a57fd2da442cd5d90a5b
SHA5120156237c19f5e922af20f454e4cfe26746a62b6c0342fe11e93f0c2eb785ec3727f9be6dbe95c7e1e505d2e2a1725767870a95320f99834bcf3e738b36f41068
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55637ba6ff561ad7f617b8f0a4c6e7aa3
SHA1cf41b0c3b74c7f61cad743e261dd4d1c6ad2eede
SHA25653f012236363b820d31c7abe3ad60102496e915435a95df4a695d25ac73e6e69
SHA512084afad3a8543aa22a1fef683746c81192af2d1b98601c3fbcc6c4edc0b8d92f521edc99140514af19b909e8eaf5c74af5f1461b35108c2b50783cc268fca9c7