Analysis
-
max time kernel
148s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 19:01
Static task
static1
Behavioral task
behavioral1
Sample
f073b6ee2e00f45cd19756a38abb11c7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f073b6ee2e00f45cd19756a38abb11c7_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
f073b6ee2e00f45cd19756a38abb11c7_JaffaCakes118.html
-
Size
158KB
-
MD5
f073b6ee2e00f45cd19756a38abb11c7
-
SHA1
867bd7d61ee651db0b981bf6dfe2417ecda14c5d
-
SHA256
80413967e4851626cf1bae74045882e1b1c950ab6e765eac18f1aa56a3ef06da
-
SHA512
3bf1ce3ebcd874e595d6c969637cca19f0935a4022d2b752b0e64df7647eaa0d6ae61057b5745c0f0c4815bc6099fbbcfde159d241829b03a0766e1b44fb3ca4
-
SSDEEP
3072:MGsWV8GOCn2cuvONWu1WAzxSqztM1wB41bE7DO:UquvONV1WAzLIwBME+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2920 msedge.exe 2920 msedge.exe 2344 msedge.exe 2344 msedge.exe 4324 identity_helper.exe 4324 identity_helper.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe 2344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2388 2344 msedge.exe 84 PID 2344 wrote to memory of 2388 2344 msedge.exe 84 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 764 2344 msedge.exe 85 PID 2344 wrote to memory of 2920 2344 msedge.exe 86 PID 2344 wrote to memory of 2920 2344 msedge.exe 86 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87 PID 2344 wrote to memory of 2192 2344 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f073b6ee2e00f45cd19756a38abb11c7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97b3246f8,0x7ff97b324708,0x7ff97b3247182⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12229481702898776764,8578165824926037047,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,12229481702898776764,8578165824926037047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,12229481702898776764,8578165824926037047,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2688 /prefetch:82⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12229481702898776764,8578165824926037047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12229481702898776764,8578165824926037047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12229481702898776764,8578165824926037047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 /prefetch:82⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,12229481702898776764,8578165824926037047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12229481702898776764,8578165824926037047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12229481702898776764,8578165824926037047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4604 /prefetch:12⤵PID:2272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12229481702898776764,8578165824926037047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,12229481702898776764,8578165824926037047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,12229481702898776764,8578165824926037047,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2296
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
304B
MD5e6c37bc23bd797cfc12754da13bb314b
SHA1b09c7ffd01e09d4f8b5406e6951bf9a5c34d3ee7
SHA256e11cdc536d32bc52b20084f3ee67ede1aa22764db8429f42b622a9c9ffc0935d
SHA512d48e1407035f467a490a1d6c0adead4e56579c074a17911d75bdc63ede78cab56860290744f9d713a28a87358cafb0b2ab4c5fa3ddebf8229c2bb011218ad251
-
Filesize
5KB
MD57696ee268d7b6c0e29e503c47a18bdf9
SHA19605688e49956ea0d2d8dbe77d7caa60f184fec5
SHA2568ebe0a7785400da45608cfaf110ec6736a170e8c271d3f00e82d5f1a3f91db9a
SHA5121acb497819f66ab85a152ae0f37a13c48a15b1f4c8e05f1d136363aa7d1a97cf9eea8f12aa95528943b080f4dded65afeb30b365513cd5b6eb3400628116e713
-
Filesize
6KB
MD5865f5d3b7af88beeb5c4786e2b686977
SHA1dc483ce3b126b29c171c82b51484ad8f3a48e0f2
SHA256307f1de80b066a3755a99c9b9e4c015ab226292eec494ffa0bb768a8623592c4
SHA51293ec8cb341de992b393b87f4e9e9f587d2de4964eea6dd5f30968b100a47f44012898d21295ba344d68d9bc9c8d2f536d40e6c8d94765afb7ef01c8c5ae88a79
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD56c7516f9773e0f67ef3f058aa1db57bb
SHA15fb11c2c52c31251e1de53390abac58f77592008
SHA256f46d7041800e08ab514660072380fd0eb02104b815d1cb4ca5a9943b351728c0
SHA512bcc94ca22e3f70adcbf8f58c0f9a195e6f7e62f9eadbcf4634357413fcaca2372b5bdc3f59802221e23c3719c4de1874f15270e63b5fe8584e2fe151717612c6