Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
ef468cffcbea0b5dce9c269477dd080a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef468cffcbea0b5dce9c269477dd080a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef468cffcbea0b5dce9c269477dd080a_JaffaCakes118.html
-
Size
6KB
-
MD5
ef468cffcbea0b5dce9c269477dd080a
-
SHA1
255bcc14e8af6895450a34209c2a6e040ddaef8d
-
SHA256
3c8ec5856512e7e58a51ca83d36bf4943564a5147d06fae18ab8db9dbc6c3e61
-
SHA512
7fb5c8ef14b41614d723100ee283d5c23641402d7635ed39adcca6d058bf744788f4b711470ce2b44993f923251add1e24798b94a457e5cb1cf10687456ca967
-
SSDEEP
96:uzVs+ux7DQLLY1k9o84d12ef7CSTUOecEZ7ru7f:csz7DQAYS/Wb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3904 msedge.exe 3904 msedge.exe 2984 msedge.exe 2984 msedge.exe 3704 identity_helper.exe 3704 identity_helper.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe 1944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe 2984 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2564 2984 msedge.exe 82 PID 2984 wrote to memory of 2564 2984 msedge.exe 82 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 4488 2984 msedge.exe 83 PID 2984 wrote to memory of 3904 2984 msedge.exe 84 PID 2984 wrote to memory of 3904 2984 msedge.exe 84 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85 PID 2984 wrote to memory of 2156 2984 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ef468cffcbea0b5dce9c269477dd080a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc103f46f8,0x7ffc103f4708,0x7ffc103f47182⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5094659647121462914,4332683656649200855,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,5094659647121462914,4332683656649200855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2440 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,5094659647121462914,4332683656649200855,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5094659647121462914,4332683656649200855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:2876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5094659647121462914,4332683656649200855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,5094659647121462914,4332683656649200855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,5094659647121462914,4332683656649200855,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5256 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5094659647121462914,4332683656649200855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5094659647121462914,4332683656649200855,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5094659647121462914,4332683656649200855,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,5094659647121462914,4332683656649200855,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,5094659647121462914,4332683656649200855,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5600 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD530e04484b34b05690fbf52d2ab4c2656
SHA1d8ca3202d58530a3c00a28f3b0697d86a397ca0c
SHA25695cc2abc542c98f49f78ffcfafb0b3b9919c9eb3a775bd6a4e5e1f8b8541f59a
SHA51250965ecab24e85f4fe055f700212a8b4720d8317b0c36f241f8011ebee27fd71eb26509d58a05e31e4e28ffdf4c72318d3c6db5fd6ad024663d32587342a633e
-
Filesize
6KB
MD557f85ff0c78b99d4fcb63d080e90497b
SHA11426184b0b7778e17866648a2241ce9964381526
SHA256d53fbfc5b7d741ac6a5268efb158a3e0484a099cd994e0948fad9469a02826b1
SHA512bb99edf6eebb07a8646550a7b23c897844a33b85d89c5bf7cc459581dfb7f29e83bec627513ee0c90ff0ef173f8b4efd1ffa22d2340487eeb690d1e10213dbc8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c44347324de09b0764428f694b4ab170
SHA10fb97c0cebb1131d70272e75ac1025f06d97348c
SHA2562891a4144a3bcbe8ec835b7c41cb8089d287809e374dbe970469ed61090d9afe
SHA512ab00a4cbd69cf9d6d8227abead3becd933e0ebcc12beb27a764cc7f5923acc4a4d38efa250008f6bdc29aa971694595cedeb1372887901a11e8a5cab28a8ffeb