Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
efd08f55afe7e8fa873ed155ca8ddaf2_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
efd08f55afe7e8fa873ed155ca8ddaf2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efd08f55afe7e8fa873ed155ca8ddaf2_JaffaCakes118.html
-
Size
25KB
-
MD5
efd08f55afe7e8fa873ed155ca8ddaf2
-
SHA1
eb0616bd965e6c6b9514a6209719b532bc128d2f
-
SHA256
74bd1c15c3def239909c5a638b1fda287742ae8a40d8a6fd957e9df6b0fd0eea
-
SHA512
bbfe20ffb52ab373c8742589f7a4f3a6acf307d7d2544c67ba7be1a0ec9accaf5653c83387638e2f227b2f263819360c4270fd7bd8486c6a6ef8a0039e7dffc4
-
SSDEEP
768:has3aJm3p1zbimhr7hhcCyK3ZY866OyUyIA/98ME2O:R3em3p1zbi4XvdlJj66OyUyIA/98ME2O
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4712 msedge.exe 4712 msedge.exe 2136 identity_helper.exe 2136 identity_helper.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe 4816 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe 4712 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 2008 4712 msedge.exe 82 PID 4712 wrote to memory of 2008 4712 msedge.exe 82 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4264 4712 msedge.exe 83 PID 4712 wrote to memory of 4968 4712 msedge.exe 84 PID 4712 wrote to memory of 4968 4712 msedge.exe 84 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85 PID 4712 wrote to memory of 5028 4712 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\efd08f55afe7e8fa873ed155ca8ddaf2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffce0eb46f8,0x7ffce0eb4708,0x7ffce0eb47182⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,15077177198324052362,6357815994321535709,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2264 /prefetch:22⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,15077177198324052362,6357815994321535709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,15077177198324052362,6357815994321535709,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15077177198324052362,6357815994321535709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15077177198324052362,6357815994321535709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,15077177198324052362,6357815994321535709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2252,15077177198324052362,6357815994321535709,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15077177198324052362,6357815994321535709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15077177198324052362,6357815994321535709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15077177198324052362,6357815994321535709,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:2120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,15077177198324052362,6357815994321535709,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,15077177198324052362,6357815994321535709,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
188B
MD59e60751db3c2c5b6a54f6cb18f9a387e
SHA1c3815742501bd3eb5456958d253c57fa48f14451
SHA256376006f8fffee91ede6e6367fc46a81ad97568e59ede6bfdc1aba6420294d6d1
SHA512e25d565bc4a56dcdb10bb2eb9daf4b031746652cfa55658f35331bc72b0dce59861fbb0a3923857a0382e1b0ef6f38022b13f34e84133567f37872738b12aa96
-
Filesize
5KB
MD576e6467948ccb6d1901639ed76bf4f4b
SHA1ddcc88748de14bdbef5646d039a90d001208e5be
SHA256e153bc76eeb83e89bfa41985b03da5a0c5ffaa8ef5b9c337f99af745c26774db
SHA512ca93e66125b736861a31a3662d990fc677ab97897572e1cc70577a46ea20d2c33914297a244969193fd9db736042dfc47898a26216bbd5c5532b9b447685ea97
-
Filesize
6KB
MD5f3ade6e3c3ee927d0151c298f46db3db
SHA1636809d1f36c855f9e12cbe0ee73191afb31f6fe
SHA256d211c2aa4dbfd7b365de79743ee86a1aa6b4d0f31229b92f2149c2e3969e2ebc
SHA51251eadb3f91ffdac8b95cfde1644fc7de82f5a9c3c710e6dfe4a455343492a6473a2e0979becc563f3207fdf7c6a88c177087a691786faaa50b42243c97be2711
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54a783bc7d7ef11a9348b52ece8281e03
SHA1a0fb7eff957138b1165d8df3d2fa68fda2aabf8f
SHA2562ab5fc781170d5c5ca09bbc8f4cc1eceb4fa9577e5e3dc61629a905f6575c5ad
SHA512e6f582394aad31edf12cf2dd37afc11f3b5e477a99d66d566b8746eba39c6605c9e9f67aacde1d4696109745eea4b1c53ac1586e4e040ccead8efb571782ee8e