Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:40
Static task
static1
Behavioral task
behavioral1
Sample
084b6bb180f79590c0d5ead423215b34_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
084b6bb180f79590c0d5ead423215b34_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
084b6bb180f79590c0d5ead423215b34_JaffaCakes118.html
-
Size
31KB
-
MD5
084b6bb180f79590c0d5ead423215b34
-
SHA1
4e3f8c8867e3c273334fdaa7bfad6cbb5855ab5a
-
SHA256
b9bf690da88f2d4fc79d4df08fcafae62d9e9727a984e242a20ed1182df0d18e
-
SHA512
fb8a3cf275e17c20d09d98685cf4bad4ee4e8b5657b5d5f56e4e3be5c9bd187a4fa3763c80280cb1c1c148a2234ae448e70f7cc0c93e7886f7d8da01235e6e15
-
SSDEEP
384:Jda4V/HkloMlC5znnnNvNyLfNvNyGn9RNvNy1nnrNvNyYnnDNvNysnnlNvNyAnnP:JtVIC5znOn9gnVnRnTnV9Kihr50va
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 852 msedge.exe 852 msedge.exe 4772 msedge.exe 4772 msedge.exe 3936 identity_helper.exe 3936 identity_helper.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe 2208 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4772 wrote to memory of 2276 4772 msedge.exe 82 PID 4772 wrote to memory of 2276 4772 msedge.exe 82 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 852 4772 msedge.exe 84 PID 4772 wrote to memory of 852 4772 msedge.exe 84 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85 PID 4772 wrote to memory of 4448 4772 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\084b6bb180f79590c0d5ead423215b34_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc40146f8,0x7ffcc4014708,0x7ffcc40147182⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6316231358049401033,1595184339360486346,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,6316231358049401033,1595184339360486346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,6316231358049401033,1595184339360486346,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6316231358049401033,1595184339360486346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6316231358049401033,1595184339360486346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,6316231358049401033,1595184339360486346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,6316231358049401033,1595184339360486346,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6316231358049401033,1595184339360486346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6316231358049401033,1595184339360486346,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5312 /prefetch:12⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6316231358049401033,1595184339360486346,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6316231358049401033,1595184339360486346,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5648 /prefetch:12⤵PID:4324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6316231358049401033,1595184339360486346,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2208
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3116
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\20a6af84-6cdb-4cea-8525-2c0993cff3d7.tmp
Filesize6KB
MD52ff369629812f83bca8998815cda0a65
SHA1eb08c8b9066f74a158667a8f4f38ab1755dccdc0
SHA2563d4dd867f5a94644665f19b0a6126f3005676fffc661acacde6866ea36dc99d4
SHA5122fb045ceb85ea364b0ccf57bf9831fde82cd0d8d7178d1ba71b0f30021c13f5896b7a177e278e6d566c32e8dec7271dd51a62c934fda3069c85f612e05480520
-
Filesize
641B
MD51c0d031da8ea62ede03f1f19ee5ee519
SHA164fc2372826ba7f8f85869554c2e4f4d4e8d4fd8
SHA2563d7e789cb8bd3cd911195f5adb4fac4279600ed46d6cdefff3a31c973d08192d
SHA5127739d3d53e28403565015f3c46bca006924071cfcfd530170fb1f77bdc38e4f423ad146baf925dbaca646319d99ce831c476eb762fae2448100cfd9abf458fee
-
Filesize
5KB
MD534de0cf784d437d0588cfceb3192dea0
SHA1b0ba63075d81e933d79156a6d4786f665b39cbcf
SHA2560b12d0f26fa6c6ec6b92ebd755f096a288367503e4e56800569d68e48825f1b6
SHA51256a0418a47bcd8ad51c2c2c09a42c6bf583d514e44057d3bbfa23362753376c52493c1a9b6d82b5baab291624c273aaefdfa6c76f39d7a0719b34de90453ac85
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fc5adce55fae8ad7b5035f2d9d19b34a
SHA1f750ed2252fd3d08719afeeeabf54c12afa1a13c
SHA2566332078ab9f773bc2aa792b33eda3165a9a97f01244550e8cca1cc88d7f287cd
SHA51209282ad406638f1e6bba391107fb38ffaa28ee76dc5dc6bf3ed0dad7e1e13d66d357fe6136e5c97e228e93f2492ddfe3ebba5d7ad87a6c3abbd70d5e4fc804e8