Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
145524c9fa6ecfb3d65fd0636077e8d9_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
145524c9fa6ecfb3d65fd0636077e8d9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
145524c9fa6ecfb3d65fd0636077e8d9_JaffaCakes118.html
-
Size
573B
-
MD5
145524c9fa6ecfb3d65fd0636077e8d9
-
SHA1
1af81c3e1d52fa97d6a12a074249b00daca72e3e
-
SHA256
356976a023ceef6ff95f5f02f151dc1b1e1478a3bb19d85bea6ee43c0f49f9d4
-
SHA512
ccc760cc1be150bf5b8e783da3b26ce1faba734c5d9340324cab6833fe5cfdd2c32e008d6f204845d8f5c0f860d662a6cac668ea7c168539cacf44d8e0ab301f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3668 msedge.exe 3668 msedge.exe 4660 identity_helper.exe 4660 identity_helper.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3668 wrote to memory of 3664 3668 msedge.exe 82 PID 3668 wrote to memory of 3664 3668 msedge.exe 82 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 4152 3668 msedge.exe 83 PID 3668 wrote to memory of 3792 3668 msedge.exe 84 PID 3668 wrote to memory of 3792 3668 msedge.exe 84 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85 PID 3668 wrote to memory of 3912 3668 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\145524c9fa6ecfb3d65fd0636077e8d9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd472946f8,0x7ffd47294708,0x7ffd472947182⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4268 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,6663239687420924216,8107102226754240385,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4352
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
5KB
MD51d35cff66a86c4e31938a4e60108644e
SHA10d122452a063ecff36e7a9ac2879fed9bc790927
SHA256ad4acc5e5d8569a6a99b9993e51f86720e0230d1a6247567d4d5e324ca7e175d
SHA5121a212697f00fdf861feb81cfbf054c94b084bf0584ab9a4efd942408ce08e3d7a512c836b983ffe4eda547be69db1d275984128ccbb4398d8d23faaab6caddae
-
Filesize
6KB
MD56911f7a828874892d65a16b393b36fbd
SHA15adf051a5d81bbf092374a64f29cb56b1b0935f8
SHA2561423dbe13fd7f98b3c6b321e28fceef37e8b5f43d44947c29af1b5588163aa01
SHA51283ef8c09a79bd6b0e47b7119709660caad2d54651d795cfc1297801bc5d622d6ff520643493acd5f2f691631e555a88ad915948198a5915f9621936beec612b1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b747900289d9c6f385b8e82e35d29420
SHA1ea606dc61f5eb32e6323b6905de4470b85cd4af1
SHA256d7851ce7e9f8348e477b0044dd2e0b637c9ff85ce917245d3be281ee1cb74bbf
SHA512215fb734b1cc43fd8cbdcb2cfcbe8df142eb5f39dc847c09620e0f9e5cb75417c2aa965426c34cad8ef0f20aa01e91ddd73e99e836f93176c5fb80dc29c26ee7