Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 21:15
Static task
static1
Behavioral task
behavioral1
Sample
deea420f9d2bec7be7353f3395a6dc05_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
deea420f9d2bec7be7353f3395a6dc05_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
deea420f9d2bec7be7353f3395a6dc05_JaffaCakes118.html
-
Size
10KB
-
MD5
deea420f9d2bec7be7353f3395a6dc05
-
SHA1
54d929eb0b12ec3df32dccffa335498867132325
-
SHA256
14eeee89f2707646bf25bf50f1c17a9ef6814c4c000c54a42a90537f2454f5b3
-
SHA512
70935eff55c057d04fce8387bcf349dfb3790e9e64d8da7a1f07d1c6d5f3cfa693615d4f7b82d44648e2e1068ed511abd1e40922f0456c1f63325b81a4f2eaf5
-
SSDEEP
96:uzVs+ux7GYtLLY1k9o84d12ef7CSTUcGT/kkFpg3HXo7gYcvsv2xnlVHcEZ7ru7f:csz7GYtAYS/tWgoMrJxnPHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 2552 msedge.exe 2552 msedge.exe 2704 identity_helper.exe 2704 identity_helper.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe 2188 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe 2552 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2552 wrote to memory of 4268 2552 msedge.exe 83 PID 2552 wrote to memory of 4268 2552 msedge.exe 83 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 4800 2552 msedge.exe 84 PID 2552 wrote to memory of 1260 2552 msedge.exe 85 PID 2552 wrote to memory of 1260 2552 msedge.exe 85 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86 PID 2552 wrote to memory of 2356 2552 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\deea420f9d2bec7be7353f3395a6dc05_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83a3746f8,0x7ff83a374708,0x7ff83a3747182⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8577089999198161923,9015994849694026027,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,8577089999198161923,9015994849694026027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,8577089999198161923,9015994849694026027,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8577089999198161923,9015994849694026027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8577089999198161923,9015994849694026027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8577089999198161923,9015994849694026027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,8577089999198161923,9015994849694026027,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8577089999198161923,9015994849694026027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4744 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8577089999198161923,9015994849694026027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4728 /prefetch:12⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8577089999198161923,9015994849694026027,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5520 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,8577089999198161923,9015994849694026027,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,8577089999198161923,9015994849694026027,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4788 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2192
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
5KB
MD54738428a0d14dedb41df4adac4af9280
SHA1f29236913f4a391510fc5ae2ebe2a1cab102bc6b
SHA25609675e2021193922e1055f64095c768e048b772e26c8b15d35bdcf2c7afa9027
SHA51240653c8c7c112b81125d3a8abbf764834c332bcc66da61ccac650381748731fe762ae43e09621974e397272ae9a02c9b9ec3d95f4625ebac08d5e327ad3732c2
-
Filesize
6KB
MD510e4b91fad1574cd60d7a115628b4c84
SHA12cc601bddd176ed96460ed1591a7d6c4a126f1ae
SHA256ab7e10f826dedb453e6400d1e60043a0e5e4dd10315dea16afd5c08523b19c20
SHA512763f1c0f6cdcbbf6a4ddbb5eaf91daf59520b232aa810eadc3d586d190086df2d070eea4355a45799e0ed4e59fd43760438d292e7862f4b27b1a0374c212eb90
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52113934a0f0724341786bb1840b84a88
SHA192755fbea4c10720667480922cba83daa93d9e71
SHA256c018af53891c0ffb8341f3c5a61ed71ba97a2059ee7cc99da5d1113c30c3539d
SHA51285d9407bf0ab569da73c0e1c265c4795cf484ca4393ac245d72ea01feb0ee714966b9f3d7d90be7b41566ae25282f4ddfbbc1b249279bf4a91be2e1cd09da73d