Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 20:14
Static task
static1
Behavioral task
behavioral1
Sample
105e5a82ad845f4de9441944a802d096_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
105e5a82ad845f4de9441944a802d096_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
105e5a82ad845f4de9441944a802d096_JaffaCakes118.html
-
Size
14KB
-
MD5
105e5a82ad845f4de9441944a802d096
-
SHA1
2ee13e374a78ad6bd06f6a95e58c4ff106c345bc
-
SHA256
6c1bb66dfc72d2a5d336c18e69b75c1a404cbe9085fc5fd6f276ce402a32dcfb
-
SHA512
f26c43d08bb9cd7ce9b2b4540695f6d2e7a32cba1c8ea8c3198be13a7b7c5e452ae4099075270ca3a47be852fc8eff56d9ea8a02fa2e0d88b16c6da205be2c52
-
SSDEEP
192:1aL4+VgGzKcersHUMD/kIRINkVi9k5XtbbkdsVx:1aL4SLHesHUmcIdVZ5X62Vx
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3492 msedge.exe 3492 msedge.exe 3548 msedge.exe 3548 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe 2712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3548 wrote to memory of 4920 3548 msedge.exe 82 PID 3548 wrote to memory of 4920 3548 msedge.exe 82 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 4596 3548 msedge.exe 83 PID 3548 wrote to memory of 3492 3548 msedge.exe 84 PID 3548 wrote to memory of 3492 3548 msedge.exe 84 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85 PID 3548 wrote to memory of 4232 3548 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\105e5a82ad845f4de9441944a802d096_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff3b0a46f8,0x7fff3b0a4708,0x7fff3b0a47182⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,6932227164429160824,603724312476130185,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,6932227164429160824,603724312476130185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,6932227164429160824,603724312476130185,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:82⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,6932227164429160824,603724312476130185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,6932227164429160824,603724312476130185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,6932227164429160824,603724312476130185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵PID:4120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,6932227164429160824,603724312476130185,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,6932227164429160824,603724312476130185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,6932227164429160824,603724312476130185,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,6932227164429160824,603724312476130185,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4200 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,6932227164429160824,603724312476130185,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3472 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,6932227164429160824,603724312476130185,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\44b0d80f-a4d6-44ab-b098-7c9237a34578.tmp
Filesize5KB
MD564ae524a69eac29bf083acef0a62dc14
SHA125a801277ed2e8758f347e5e13a6d3fb2bfd8b96
SHA2564a0f7c47c65dccdee1491e24f7933fa99d58783a0a675a9988334285a28e53cd
SHA5128cdfabe94e7cb175791eaac5f323182c22748118d318f2ba21f0689dae2e06e803f8f81d800439993f25279dcd810b64ed925de8c77655e2d6bf01a48cd33f41
-
Filesize
477B
MD573d1bcd4c1fb93d9df35a3857f4c154a
SHA1ea09c8ad1e9dd31a21f474bcbe065823789ff2a1
SHA25631b6cfc6d6f0c077c9100b4a92d88e199be9a0dcbe37652493ab3f34e00ffcc9
SHA5122df9616c66fcf79cf98f2d4084dcfc391a3c3502da728507d9e9d5089b8dd061ed1203e12ff11a8f33e42656937a7add0de503b065bf8a3b822c76821221c9a7
-
Filesize
6KB
MD56d04614f4f25dad5b7a475e6b4d10167
SHA10af1abdd0916a286eab593a0b28b83b0397c4f6a
SHA25663218265bbeff2652f0228fc4df2da76ce42f2be7365c605859225047441a5f4
SHA5120c541ad0757ad78d942e77d41e553c899f500ff54906a136685109b0f9d181c658a7d04290b5b14279e33b087d6e62eb78f3b42a0ba400ae3873f96cde9d7086
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c01fb6a4b388736049535bc2393a00f7
SHA1f423e29a94e911fa0968787bd558bcd892652a1e
SHA256aa6913c7be396638d0afc76d0d2f371742ca142bf2249a568b1ce0aeb38e664d
SHA512aedf7b105fc02a515d83dd8445dc6ba3e0218981b89a7881dcd0eac196373d1843b65790e5de19b6acfecf719232e22cd343b185d9f27391a3508c9d3ae26be9