Analysis
-
max time kernel
141s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2024 17:54
Static task
static1
Behavioral task
behavioral1
Sample
145db71d641ec13b90898e346ce26a76_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
145db71d641ec13b90898e346ce26a76_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
145db71d641ec13b90898e346ce26a76_JaffaCakes118.html
-
Size
83KB
-
MD5
145db71d641ec13b90898e346ce26a76
-
SHA1
e5b1e0be6e9d8dd013d813e0f73bc281cd50f162
-
SHA256
8f65a3feb3d518bcf50d25a47d9c936bb6deb7d8bb104c21de6e612b11789d94
-
SHA512
c7786b2376e3b131549968eae94551ed92a0ebcb7a6cbff9fdbfa8caa9d5162ee7f945961feafd99c8ce2df5ca4003177dc0ddea2207d89a7e3e95002d6f9256
-
SSDEEP
1536:eezq9/ShVdZIZNcNtxNSNeNBNYNoNJNbNjQxQ:eeO9/ShCZNcNtxNSNeNBNYNoNJNbNjH
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2188 msedge.exe 2188 msedge.exe 4488 msedge.exe 4488 msedge.exe 3580 identity_helper.exe 3580 identity_helper.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe 4488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4488 wrote to memory of 1020 4488 msedge.exe 82 PID 4488 wrote to memory of 1020 4488 msedge.exe 82 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 4532 4488 msedge.exe 83 PID 4488 wrote to memory of 2188 4488 msedge.exe 84 PID 4488 wrote to memory of 2188 4488 msedge.exe 84 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85 PID 4488 wrote to memory of 3616 4488 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\145db71d641ec13b90898e346ce26a76_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff227e46f8,0x7fff227e4708,0x7fff227e47182⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2184 /prefetch:82⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6112 /prefetch:82⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6112 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,16784449746461129310,12846023526820092175,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4704 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5992d6b4148c68caf3b1afe0efebb1043
SHA14ebb53d5d065ca6cd356f065a92e87bb696d10c7
SHA25672d919e188f38724f1b689098c8f7ca91f01c44fac20e54af7562980fa38eb64
SHA512f60c641b32c5f9400e692ba4daf898f9a38aa007b438ded5309b43940c5c2be92f13c38fc773e721cec5be9e7d301e3f6b181dc3a841a7c410c728a7489c4658
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\18b41669-bf04-4c37-a69f-0ba2878a29b9.tmp
Filesize6KB
MD5464068620ce38d960cde2e3626128095
SHA13bfb3bbfaf3a02154990f535a3742a8df241cc04
SHA25664476a62e275a9056fbed4059dd5ae4430d81544970dda72144aa290c010f45f
SHA512d81abbf0e0eb35f1917aae26b429384ffab905df5203412020c9af937d08d6daf78d3d3b43bce4a649cfaf5d71de91096bd18d8ce6a17d3930d8c5416d3394b0
-
Filesize
741B
MD5f1602f372df784fd7d50bb858a0917fb
SHA1fd6c384a54a2902995049d197ddc33295e752c69
SHA2566161afad0f1158f613c1a6a0ddf0f0b74641c224f63e838fc698fc942c66ae8c
SHA5126ddc2602827a2ea639533ecab9aebcbdc3cbfaab2012fbc39b17ff79adb25e6d03572ccd6d2514e47c3caef06084a378fc526b6fd39ea201263ea21e254f0920
-
Filesize
6KB
MD512af0d4a34f4da41e45160d1261e8245
SHA1a0ef979d9a442dbdd3493063a71c672c81c4c679
SHA2563fbe475719b3dda2c32a17e9c9318c251f11ba277d2cc9b887c3d7c9f4754473
SHA512bc127be3906e772d97a4556aafed928ad8479e07998df1f7bbf93148e1fe5777d57efc390b16eac7526b363c367db556b50d619fe7a1c516c2573f4c901ac225
-
Filesize
5KB
MD50e938c3f91c4d0c66429a353edb05deb
SHA1670f062cd16ac15e6022e228207165a821c45b45
SHA256a3a561f9635448f5b70e5d7771116f0d297551a52ae41745faaf35b20d47fbc8
SHA512c15ad7de504c4eeac4598c628d65b56d047d36a39bc30fa783ae545558fd182533d5175054663e7a923576d355c0fe476f69e24f422f82ee3173dbb0a1390235
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389