Analysis
-
max time kernel
138s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 22:48
Static task
static1
Behavioral task
behavioral1
Sample
f7022166c803c97573f0f8c24272f0b2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7022166c803c97573f0f8c24272f0b2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f7022166c803c97573f0f8c24272f0b2_JaffaCakes118.html
-
Size
9KB
-
MD5
f7022166c803c97573f0f8c24272f0b2
-
SHA1
7c13e4404e0cbd085f2a68aa37ff55c692a2abb0
-
SHA256
5257cb452f40e22441eee21e028332d9035f2f4af4acbb4f747a7bde862d52d3
-
SHA512
9081ecadd95e3342ef3d63ba8df4aaec7327b73ce28b7eb7c44aa10c776ce9f20d99b95f6a284a19f8d64d87c70bf5acce35ff2bb2629f7e70c7063ea1729089
-
SSDEEP
192:k120R4/Euq7EKQ213mAsvXsWCcG54w3vkiUM5/CD:k1fwEucQk0b6ag9w
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2524 msedge.exe 2524 msedge.exe 1644 msedge.exe 1644 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 4504 msedge.exe 2880 identity_helper.exe 2880 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe 1644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1644 wrote to memory of 2456 1644 msedge.exe 82 PID 1644 wrote to memory of 2456 1644 msedge.exe 82 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 3088 1644 msedge.exe 83 PID 1644 wrote to memory of 2524 1644 msedge.exe 84 PID 1644 wrote to memory of 2524 1644 msedge.exe 84 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85 PID 1644 wrote to memory of 2972 1644 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f7022166c803c97573f0f8c24272f0b2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9c0a46f8,0x7ffd9c0a4708,0x7ffd9c0a47182⤵PID:2456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,3363226695046821760,2782148045247177813,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,3363226695046821760,2782148045247177813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,3363226695046821760,2782148045247177813,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3363226695046821760,2782148045247177813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3363226695046821760,2782148045247177813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,3363226695046821760,2782148045247177813,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1412 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,3363226695046821760,2782148045247177813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,3363226695046821760,2782148045247177813,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4816 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3363226695046821760,2782148045247177813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3363226695046821760,2782148045247177813,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3363226695046821760,2782148045247177813,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4220 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,3363226695046821760,2782148045247177813,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5564 /prefetch:12⤵PID:1996
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
6KB
MD5bbeed54c97122872e2a8a710befebfdf
SHA1542e8ef83c1876456f65f7b595385b17955b5da5
SHA25657d6383678c055ecbc9beef25d76b210de99a4107c80c21392959db63673d9fe
SHA5120015bc6dd4ae5d58fcc1dbcd663eff68665ee410fb4764531b73a9375946a2974dfa2e98d01657385bd6e31ef2847eb0a66803f2615600d4f4ede1620c69503b
-
Filesize
5KB
MD574265187b50d4f8dafc8a574f3a326f0
SHA1d2fa8b936840774337b7ed38672e9dc043188f63
SHA256ded8341c433692e5317bc957f05c4740bc0a3ee67073c9de361a9fe4369424b6
SHA512391567ceb18b0ea668c7d04738498df225a55e2c22ec3598a9648880ef8c2cae3a376b517a30c1354deba489e293a45ddafd3e000bda0767c7d7fc9031b8ab59
-
Filesize
6KB
MD57a6a845b0d948ace008e8cc19c0f3369
SHA1d42ed696af344df0cf844cdc08ab98afb9378ec3
SHA25686f530ecaca54878d903cfcff30fdd4f52c62efae09306d7364baad30bc413f5
SHA51246f90ccafc01be0b1621539324747bc215f2075c88e8112561e07c4e7058f9318404510c14a88a01e2edd7114fae6b325914b826383d550d628ef3485ce39eca
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54503c30909213bc44ba29046a8fb81ae
SHA1a91361aa11c4efa723bd1f92fa7cdd3d53b61386
SHA256bc524117831f7547b9b08eb04e535ea4366db50bdb1a689e4b77315434ea418b
SHA512cfecc8bbb621bbea05fed6e46718ae70196a5a90052d2574d85a3bb803b4944e7fc3e58f63f9ebd7c8305db8879a16b4bd35c3bb3c34ed8d6121296c22819532