Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 04:32
Static task
static1
Behavioral task
behavioral1
Sample
f5313696a04da17a459634cb0f99d1ad_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5313696a04da17a459634cb0f99d1ad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f5313696a04da17a459634cb0f99d1ad_JaffaCakes118.html
-
Size
26KB
-
MD5
f5313696a04da17a459634cb0f99d1ad
-
SHA1
ef8e9da453d77fef4cdc1c769538234738e6756b
-
SHA256
d71680b21a69c0c253d6f7e5fd9dce5c00fdc54a98d64302b5f1e5d664ee88a8
-
SHA512
0ac077d25dd7a2ff9261ebcf9c02dfd1db8bd43138d73a5c5a9132de10fef56bb4a22919d4b4c33b6a1393c1891534214fac075edf7b9a23e52f9eecdbf9fcf5
-
SSDEEP
192:uqaz7Mb5numnQjxn5Q/xnQieUNnZnQOkEntXjnQTbnRnQ+CJVevo7NtTFo+NzQ4d:nkQ/wygcoK+q
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 3148 msedge.exe 3148 msedge.exe 740 identity_helper.exe 740 identity_helper.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe 3228 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3148 wrote to memory of 948 3148 msedge.exe 82 PID 3148 wrote to memory of 948 3148 msedge.exe 82 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 3000 3148 msedge.exe 83 PID 3148 wrote to memory of 4356 3148 msedge.exe 84 PID 3148 wrote to memory of 4356 3148 msedge.exe 84 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85 PID 3148 wrote to memory of 2936 3148 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f5313696a04da17a459634cb0f99d1ad_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd62ac46f8,0x7ffd62ac4708,0x7ffd62ac47182⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,4113547474428978711,10642272194268902881,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,4113547474428978711,10642272194268902881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,4113547474428978711,10642272194268902881,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4113547474428978711,10642272194268902881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4113547474428978711,10642272194268902881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3428 /prefetch:12⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,4113547474428978711,10642272194268902881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 /prefetch:82⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,4113547474428978711,10642272194268902881,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4113547474428978711,10642272194268902881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4113547474428978711,10642272194268902881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4113547474428978711,10642272194268902881,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,4113547474428978711,10642272194268902881,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5720 /prefetch:12⤵PID:4216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,4113547474428978711,10642272194268902881,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5c3b32a08bb9a7bc829bef7ae792629db
SHA13a98fec2f948140cb0d3330e5e78558f89602eb1
SHA256f49769637dc527f7e6a343c4255dcf84c764b6e263e0b01678c1fa24e76d36a0
SHA5121a2f1ab0ddcc320214d4c697dacffe514863c1e18e25e3e1f512f38fcef1406f2bd66fb2915b510c0d331e2f9a001377390d92d02da0d3e25cca27fb89b0ffb0
-
Filesize
6KB
MD5df3fb3059679c46d44c2b54688f6d182
SHA1f0df1bbe1563dbfcbc2a7b4288bb38f849400283
SHA25607d4d517983159a95b170039cb06985ba3173aa05302acf055150a749096d4a0
SHA512bcb982502a9b4fdd7c9753a5eacb7bf29ae269cbbe256040977ed0f2a6411be0b4dfc4bf61e2aa186eab391125959f49ffa924a3dc36e003316bb98b8e341bc4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD553e6d78cb46b7943a3bfd039f88c7ddc
SHA166f5e7a1a0ec78138ac5e4bb1c0dd6abfdcbfed8
SHA256b4a188fab49feed82e3add4d36cca0fc3a6ef0236e444e79644da67bdf1be0cd
SHA512a1b6d279e738980c3fff8ef5118479bf0813db6719681aadad6d7dbede29c39fb84d4179118307def8b6fa75050a729b69d0873f414c922bda3a185ab2117cea