Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 11:41
Static task
static1
Behavioral task
behavioral1
Sample
cf71afd3961fbdae9d49c6980a6c3a28_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf71afd3961fbdae9d49c6980a6c3a28_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf71afd3961fbdae9d49c6980a6c3a28_JaffaCakes118.html
-
Size
218KB
-
MD5
cf71afd3961fbdae9d49c6980a6c3a28
-
SHA1
9cb51be14a192fb7374df295e14c9ce16d83e4ef
-
SHA256
53a70877bb1c583e39d89abca55d74180d68814d8316d5f3fcdafd36fef3e848
-
SHA512
0e573816feb612f1239ed9933eb39f9d8521cca5b3a55d4d12fe6d2ece6ac27704a69971e14010499e74c123a790dc229eebda90740f33a73b236e3a24395488
-
SSDEEP
3072:S1Q7fysfrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJK:SOz9VxLY7iAVLTBQJlK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 4752 msedge.exe 4752 msedge.exe 4228 identity_helper.exe 4228 identity_helper.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 1904 4752 msedge.exe 83 PID 4752 wrote to memory of 1904 4752 msedge.exe 83 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4140 4752 msedge.exe 84 PID 4752 wrote to memory of 4012 4752 msedge.exe 85 PID 4752 wrote to memory of 4012 4752 msedge.exe 85 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86 PID 4752 wrote to memory of 1380 4752 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cf71afd3961fbdae9d49c6980a6c3a28_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff925146f8,0x7fff92514708,0x7fff925147182⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6723090487628871687,16385426621036950818,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6723090487628871687,16385426621036950818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6723090487628871687,16385426621036950818,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6723090487628871687,16385426621036950818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6723090487628871687,16385426621036950818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6723090487628871687,16385426621036950818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,6723090487628871687,16385426621036950818,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6723090487628871687,16385426621036950818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6723090487628871687,16385426621036950818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6723090487628871687,16385426621036950818,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6723090487628871687,16385426621036950818,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6723090487628871687,16385426621036950818,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5244 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD584546901c259f700b60b6b16841100f4
SHA162701508a32c8491f024cb46d73d86261a1824b7
SHA256b9cb5fc71d22f22fc4181808bf14203961b3824e4129595b078adea8440cb345
SHA512bd0939c46f00ce4cd19bfc0f4fc5d95d05197009135bdc25465aed818c17943522c70c21241b1b8eb0d0ade0dad76c9fbe056071138bb8229af82cab7b31207d
-
Filesize
6KB
MD57f886e2f6efce92d101239d884be6a48
SHA1afba02654e5499555a580d8551fbf641c556b58c
SHA256b04f7bd7ad3806731edb3767c075e87ded2f24075a3c87f59dc8467256662cc4
SHA51242437629be259ce2db7ad62a947eb395a4b057a22668923ed87910dcdc6293d1d90fe4aef0b46b4c3ed8cc2c60faa7b70ce2453ece56b73fefb4d08876532012
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f56211738b567477d87ee2e8a3f4ad60
SHA104cd898d7080e6bac9bfba52a841bcb367d810eb
SHA2567ed6e84653c26aaf72bf759a6548e59275f51c27628d6028f801acfd7ab67d30
SHA51283c964dee0d0f65a67fedde8f7ffbdf8ea29ce1ae5a34bbc4c34fc95a4d64556f873cf5bc20a983727d7db9c0a5e010d838b73175cc424b29fa163442a06acda