Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:04
Static task
static1
Behavioral task
behavioral1
Sample
ead05ad9aa2eddf14c42b93b279a2ed2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ead05ad9aa2eddf14c42b93b279a2ed2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ead05ad9aa2eddf14c42b93b279a2ed2_JaffaCakes118.html
-
Size
5KB
-
MD5
ead05ad9aa2eddf14c42b93b279a2ed2
-
SHA1
9bb1ebd46166f5a2be042e0150c340d335b8653c
-
SHA256
49ab4241e76e87ea35ad029f7731d3cd47a18ecda49f95dd0769bce335d6f5b5
-
SHA512
3f0bee878f285ef97b52d10f071a8aaa69ce16a26a196f001e9a0af4c1db1fb6bcb0588d3e164549c03f1be7b92252f25302f12c55c8ef719129b0741f0b074e
-
SSDEEP
96:SA5soe2M47Ky2mHZbHaE66lebCx/YulX3d6MVKcv6MVKkvW6MVKfE6MVKmSp6MVz:V7e2M4Wy2m5/ZL0WSCXdpgSgrR/3ZELl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 3624 msedge.exe 3624 msedge.exe 3400 identity_helper.exe 3400 identity_helper.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe 2560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3624 wrote to memory of 1572 3624 msedge.exe 82 PID 3624 wrote to memory of 1572 3624 msedge.exe 82 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 3520 3624 msedge.exe 83 PID 3624 wrote to memory of 4052 3624 msedge.exe 84 PID 3624 wrote to memory of 4052 3624 msedge.exe 84 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85 PID 3624 wrote to memory of 5108 3624 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ead05ad9aa2eddf14c42b93b279a2ed2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9b8ed46f8,0x7ff9b8ed4708,0x7ff9b8ed47182⤵PID:1572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1468,13420561891750031902,9393200790453394086,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1468,13420561891750031902,9393200790453394086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1468,13420561891750031902,9393200790453394086,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,13420561891750031902,9393200790453394086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,13420561891750031902,9393200790453394086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1468,13420561891750031902,9393200790453394086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1468,13420561891750031902,9393200790453394086,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,13420561891750031902,9393200790453394086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,13420561891750031902,9393200790453394086,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,13420561891750031902,9393200790453394086,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3688 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1468,13420561891750031902,9393200790453394086,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1468,13420561891750031902,9393200790453394086,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2300 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
6KB
MD56e6606d4811cb8f122bb9d3daee7eede
SHA1df605deedb38afd4659773ebebc4fabdbc1ff88e
SHA2566bc9e8200fc022e66a05edd19c3ab510741af6f75ff8685610a3505d3ee9bb63
SHA51296db1643039b2006d214ef39dc33b38c49636061c8f474c0fc68b148a89ac1b05b48ba37558fc422edd774c5c2ec1ff9eb1dc5d997ddbab75ead8e824c8f57c8
-
Filesize
5KB
MD50860f5fbe6e855df6ed6d3e5bf361421
SHA1f3c8d6ecf18de3e0505893309724f29af106f60f
SHA256e6268cc4aa28c51bc92aea5150c51c4f2f22bc8d281527dcadc9fc9202775e02
SHA51272abba79db2773fdd41bd3a7c728a3977c58c113b1856a2879bd1b9adc0676e38cb2319dab1ef62a93137788f9e9595ad92e303f13ac3a9a257e1ef1f4ce8393
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50b60bf9e2d0d0ac69e55486e41c68f4d
SHA1952a790d36fa04bc57c7954987e388281bb1167e
SHA256102ec0a879376889db3e0cbeb824ed5f568943caef3729a17b1638f21c9ce2a4
SHA512a81586eb6662e1f1d69559fef5abd04fe1b4e6070c2d5eb027b1bdc2b38125991f7ae69c74364036e26155f5fbe2ae1b3bbeae6511494b3d94dddefe34b15972