Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 23:11
Static task
static1
Behavioral task
behavioral1
Sample
df125e4c4c658f55877c93ed46393a1d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df125e4c4c658f55877c93ed46393a1d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df125e4c4c658f55877c93ed46393a1d_JaffaCakes118.html
-
Size
145KB
-
MD5
df125e4c4c658f55877c93ed46393a1d
-
SHA1
7e04a76f960fe9f4b92fdcb96a56aadca98e6bd4
-
SHA256
377a88cf87aa29846bdf950d0faa31b98ab5cd6fe1b61984b69ace9d21afb504
-
SHA512
b7720c6378730bdd35aeb8eb5457e2a3593636054fe57d6c4c83ae29c022aa038b004f3e98e18122a8fced55ae927444e85d646a6c49dc6fd1046ba44f05585f
-
SSDEEP
3072:SBiJrtMnCs5u6ksEDXVeWdsT43wyfkMY+BES09JXAnyrZalI+YQ:SBqrtMnCs5u6ksEDXVeWdsTmsMYod+Xu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4564 msedge.exe 4564 msedge.exe 1792 msedge.exe 1792 msedge.exe 3568 identity_helper.exe 3568 identity_helper.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe 2732 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe 1792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1792 wrote to memory of 4428 1792 msedge.exe 83 PID 1792 wrote to memory of 4428 1792 msedge.exe 83 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 896 1792 msedge.exe 84 PID 1792 wrote to memory of 4564 1792 msedge.exe 85 PID 1792 wrote to memory of 4564 1792 msedge.exe 85 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86 PID 1792 wrote to memory of 1964 1792 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\df125e4c4c658f55877c93ed46393a1d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd3ab646f8,0x7ffd3ab64708,0x7ffd3ab647182⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:1964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4652 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6012 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4032 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,15539181516519027907,3730777289974757550,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5076 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD53cdc49c4899111cbe5d1aec26c7fdc0b
SHA107e8bbe7674d3077b282b08d333e67023bf4899f
SHA256dd5ed6f488a16d25fffb3166ee2d00fb6193f629a370eef412e810f4e4c3bbec
SHA51217d2ec128d4a95e37ed2894618d12f5a919bb0f90ba2c551f93df6dba5101df0394c18c149267af003c75f013715d45e878e1c9d2d59cd56789ab5ed2f4a4c5c
-
Filesize
6KB
MD5aa3d0320fde994907229f6fda3a420b8
SHA1dce346e70bf9cf6d3df5cc3243e1d37c3d179571
SHA256bfb337ef45ec8639ad4c8673b9db228651ccb9407551e8b8bfbfe255844fb47c
SHA51289f67069b495c9493053e187a68a0797a4f4649052237969dfdc231cf8aaa671c008bd1373354abdf837eacad5da1082442157cb4ae9d4298efb76e53e2eb017
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cf4def3d21e5a78f7e89bbe186f485ea
SHA132ffd7ff866835e2ba00d80e973300337e612c2e
SHA2565e51075d821e1509853cffb9a8ad2aaf1010bdb3c2fcdc3d3cdf33bf9248fb68
SHA512a687575c29182a586e6bc76825e2c199c387882e1fb268336fb030e3e7d165920ba6bf222b417fd3a26abf44397c45407df604f9ba4e78530352ca45e10ff606