Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2024, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
1585b60519622fd0ab725fa54cd9a24a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1585b60519622fd0ab725fa54cd9a24a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
1585b60519622fd0ab725fa54cd9a24a_JaffaCakes118.html
-
Size
9KB
-
MD5
1585b60519622fd0ab725fa54cd9a24a
-
SHA1
eee45d5eb6421a8ee9d6399ec4220e6ad69b0e50
-
SHA256
9bcc283c3995dc5c8351c8279a4b23583473d1e853458e466e1214ef1ffc029b
-
SHA512
4bae2f992be8f3ffa99e8ab851c4d641842fa8b20920469e55f4c2acd0fe5673731e0beae0152eb7e9b83f87a5bc8a25edc01fbf51a322f3672a19ce9349cf2f
-
SSDEEP
96:uzVs+ux7kKyLLY1k9o84d12ef7CSTU9GT/kPsipUlVHcEZ7ru7f:csz7kKyAYS/UdUPHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1220 msedge.exe 1220 msedge.exe 4532 msedge.exe 4532 msedge.exe 2624 identity_helper.exe 2624 identity_helper.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe 1104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4532 wrote to memory of 1748 4532 msedge.exe 82 PID 4532 wrote to memory of 1748 4532 msedge.exe 82 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 4896 4532 msedge.exe 83 PID 4532 wrote to memory of 1220 4532 msedge.exe 84 PID 4532 wrote to memory of 1220 4532 msedge.exe 84 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85 PID 4532 wrote to memory of 2196 4532 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\1585b60519622fd0ab725fa54cd9a24a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91f3746f8,0x7ff91f374708,0x7ff91f3747182⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,9238724140241388748,8364570033800824788,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,9238724140241388748,8364570033800824788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,9238724140241388748,8364570033800824788,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9238724140241388748,8364570033800824788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9238724140241388748,8364570033800824788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,9238724140241388748,8364570033800824788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 /prefetch:82⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,9238724140241388748,8364570033800824788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9238724140241388748,8364570033800824788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9238724140241388748,8364570033800824788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9238724140241388748,8364570033800824788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,9238724140241388748,8364570033800824788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,9238724140241388748,8364570033800824788,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4204
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
6KB
MD5f0df17349f609e48369930c16c597b58
SHA150fbca2dd267c9e11bf2f04dcaa688bb01fb8c03
SHA2567f83d817f196e143753529fc43d5bd6c8d3deaaf0a2b30386997c878c3b3be8b
SHA5120b84832de55fdbad00cd9e904b31535343fcb585f68359042d213ce2465a6a265e01cd27b2309977a7fbe630eb0e517ffb2b27d312c382ae6255d68bc737e141
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c4824696-80fd-47bf-9168-e280d6fa67b6.tmp
Filesize5KB
MD51fc91aea0bbd9482235a6cbee792a066
SHA104533c2532ca71a8896aa5515ac2506220669406
SHA256500fcd168f7a616e22493f4d0b8929ed86d7259cbee9f51f7fac5205f88a8c86
SHA5125f04be9910bda31ca3d3b321fa3d86f2bde2eb4bb98405f9bb892368c603ffcc1be574a3cf5944bd9a3d06d95e786b887ac85cc9437c7b299cf2206cca205254
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5727b1a21732291a634c8e1705946397a
SHA1260a863874c1890b1c5105055634576d3191fc89
SHA256259c65a2e52c39b51726d335d7544c28c73de54a0953b62895c3aa7ac3aa24cc
SHA512adde4f4e572a75724606cecf36183443136852724ef888bfb652d0c9f2088a8a6c965e239da074800eff89fcf9ddde44dc0239a25989fa63b37cbd08587f38a3