Analysis
-
max time kernel
145s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 07:16
Static task
static1
Behavioral task
behavioral1
Sample
ef4daa3ca788bfd9498998d354de09da_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ef4daa3ca788bfd9498998d354de09da_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef4daa3ca788bfd9498998d354de09da_JaffaCakes118.html
-
Size
49KB
-
MD5
ef4daa3ca788bfd9498998d354de09da
-
SHA1
9b84c654cc849ad917317f4665f6fc09f4c1df0c
-
SHA256
d9d86419b10d7b0e691f605ecda5bdfacbca009b25c9a96b43b86fbb670fd256
-
SHA512
a688012d1eeb65e3ee4f4d5f1945970207bd10676609051cf874fe86b59a59f1222d88ac834e2a0f1d1c17800fbc38c574f0d1c239f24112ae68b6f01d6fd4b2
-
SSDEEP
1536:zWdtFn/CLREd+ZUQwh0TRgInTzS6tP26s0f9w820CBf5lNpWqGhz7yGAlISWinIf:6Fn/CLRW+ZUQO820CBf5lNpWqGhnyGAs
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 2592 msedge.exe 2592 msedge.exe 5084 identity_helper.exe 5084 identity_helper.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe 4120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2592 wrote to memory of 780 2592 msedge.exe 82 PID 2592 wrote to memory of 780 2592 msedge.exe 82 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 1724 2592 msedge.exe 83 PID 2592 wrote to memory of 4696 2592 msedge.exe 84 PID 2592 wrote to memory of 4696 2592 msedge.exe 84 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85 PID 2592 wrote to memory of 4396 2592 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ef4daa3ca788bfd9498998d354de09da_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffade5446f8,0x7ffade544708,0x7ffade5447182⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,198710722669487208,7291396777701350100,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,198710722669487208,7291396777701350100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,198710722669487208,7291396777701350100,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,198710722669487208,7291396777701350100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,198710722669487208,7291396777701350100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,198710722669487208,7291396777701350100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,198710722669487208,7291396777701350100,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,198710722669487208,7291396777701350100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,198710722669487208,7291396777701350100,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,198710722669487208,7291396777701350100,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,198710722669487208,7291396777701350100,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,198710722669487208,7291396777701350100,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2396
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
188B
MD507f670ca2486d7aa2dfd4b5a2b1d0665
SHA120280f82a0a6fae55cbf575fc1d363a957947252
SHA256676002fe088d3bdec59c87340586425ee6eba4c0fabb8e99da28fb1d3aa90c29
SHA5127090a1b3ff45d324625e2047a4fc24f564113c13bacf892797dacf83ed2c13aa3dc03a48aaae8ba30d2ec01de07ff95362eac243695d910731a676c15a217f3a
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5eb62e051223e270f96e44286e107cd16
SHA14abfc4c1ab88120ce5bac988ad9759f31ca636a2
SHA25612125f6e464f6a78681ab16a14af3ae4de903fc1120059df8668eb6ecabab109
SHA5121af190cfd790f742827985215aa37ddfa10185b3654eaedee825e7b0687d7bd9e5ac1d9f936877e524deb9ca8c03ca82eebcb858e95fc2adfababdcac018a505
-
Filesize
6KB
MD50a89e65f3e54f62589bd39a150329786
SHA190a85d1e68026af6147b3dea920e97b5354f21b6
SHA256a4b57b734ce0e794a0ce44c751c2a509d101f00a7289bff1e806c5db4efa9137
SHA512317b5d8639f537027f712ed2360fc8577a4f763a4fe1e09f0a178d5b818973cceeb50cbfdd4e2ccedd4e978a70ea03f9c1821a71d1d6b526fe77fcad9d97f96b
-
Filesize
6KB
MD5c08985cfb8b7051366ac21c2b9b273e0
SHA199d2569c09d8ec3a44a2cd447d804faa13da6366
SHA25683ae8d1750d24554af13e8c1b2021f718120fde9ac2cfb63fc87e827c1aeaafc
SHA512cf1fb964725cd4ddae624b774e6b3b32390830fd8f644ed231789b3ba7ec48c3aafcbaf1200e3d048e6ee9c8afa28ffdca573b659c2ca9a5e181973b8f04e716
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57b0715463ab6e8899c06b6a1bf514350
SHA1bc637f715ebf65b260ac1233ca3d3dd77d087e10
SHA256c1fdb29724e89372303c02c2bd0e4317f7e22801a3b1961f97e994ac623b22b7
SHA51206f53ebbc9ce05ab2d022abc1aef537b1a7bceeb24cfabbc8dbbb4e92ec2db2e5928d01a4e069991535765caf9cc0084c258f4a7f6e4bf26001600a979519091