Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 13:40
Static task
static1
Behavioral task
behavioral1
Sample
523f5dfdde63a209509418a871930019_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
523f5dfdde63a209509418a871930019_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
523f5dfdde63a209509418a871930019_JaffaCakes118.html
-
Size
36KB
-
MD5
523f5dfdde63a209509418a871930019
-
SHA1
fc9e2a626b241f61b1658e9d40bd32ed7a81fa20
-
SHA256
e995a769294dcc2803a78767b25b1bb46ce4e46b9cd33c683b736a8636af3c39
-
SHA512
8cac5d53b29a2a1c9cd245454e9624a6e4163c10f443797e727fea298c40ded7355825c219f8971d7cfa1cfc461bcb86327b2e5f35746060759e5db34a4a86bc
-
SSDEEP
768:S/bVoRTW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34a3i6781DdRA4vEOjq6h8ap:tRTW81D4RA+vEOjz6raA7IayC81DdRAW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3024 msedge.exe 3024 msedge.exe 220 msedge.exe 220 msedge.exe 1724 identity_helper.exe 1724 identity_helper.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe 4728 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 220 wrote to memory of 4876 220 msedge.exe 86 PID 220 wrote to memory of 4876 220 msedge.exe 86 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 2984 220 msedge.exe 87 PID 220 wrote to memory of 3024 220 msedge.exe 88 PID 220 wrote to memory of 3024 220 msedge.exe 88 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89 PID 220 wrote to memory of 3020 220 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\523f5dfdde63a209509418a871930019_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa173b46f8,0x7ffa173b4708,0x7ffa173b47182⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1723519547942280844,10761048593468123804,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,1723519547942280844,10761048593468123804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,1723519547942280844,10761048593468123804,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1723519547942280844,10761048593468123804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1723519547942280844,10761048593468123804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,1723519547942280844,10761048593468123804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,1723519547942280844,10761048593468123804,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1723519547942280844,10761048593468123804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1723519547942280844,10761048593468123804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1723519547942280844,10761048593468123804,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,1723519547942280844,10761048593468123804,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,1723519547942280844,10761048593468123804,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4884
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
724B
MD5a4e655443e46453188e7e6e1787a9aa4
SHA13907315a76c80791d62b785e6db688fc32ac660e
SHA2569af9e1af4fc157e0f9ef8516a659f2c65ea8684fa58d65a9744067cb41c97c1b
SHA512f3e7968bc78a0e99f999ae30025076a74991ed13daf2b3ef4bf1e3f886ecb9b6fcc01d13f84f50af60236f627d866b19cf41f3dab174fa04ceee6d8eeb8ed17c
-
Filesize
6KB
MD57e8a86f4b3c5175ec488b90e40bb8fd7
SHA18231cca1c0ddeab399102bb4e953f52c11df2317
SHA2561213404a43f736dc24351f2a4a189c46ef56a1186718cf6b78d98f6d32244c3a
SHA512f341b1e0025832bcb75e87e84d2fb07004d7313d75b2d45d367fbc4e285fec7111e6108cfab2b2eaea63f979d0b11e38095dbda9065340e05a87d37eed850764
-
Filesize
5KB
MD5e0fa54a07939b8fe3d4573442ed692fe
SHA1b0d551710de5bc2551dff432681a28e84a651f38
SHA2569246fa0205af23fd802cd2824ee3b088995f5b271d44f78cc33de028288a38fa
SHA5121d3b33ae8914651348bbb70d50304b700020c00caf0ee9cc070312f5d482c3201e0124abb551f6abee53134cc26d4b86da4090fb9adc13a2ab6b827ea586d7c2
-
Filesize
6KB
MD534f0944beb107885c80a2b95e8e671f4
SHA15cc8773c9d62eb9a4eefc5aa6cfd7135bc489bfa
SHA2568f60737a8b2496b71746437d79c71d8dd85e2ca3d075dc0db2820465c0af4c2d
SHA5124e98cf7661793b1e639a70c45f3d4cee7d35bf667506f83aa01cd158e55c89a7e6fee7ccb068196f64325873234f0a63145395677aa26a61fe029eff5bb72b44
-
Filesize
6KB
MD5d5a85a9cb6b24ff0ee2dfa1cf677acb2
SHA1fe8243172cdde49848c20391e4365a418351fed1
SHA256f166e0d58ca035a418f6626e6abc2c0fa51557298e0f38dd8b463e9b003e72ac
SHA512d7166305682eb8b69359cd3a20e74baddc60abbb0aace58aa386d296b48edada596be8d2d0f3dee38621a092db1a12c05b992cbec0b5fddf55115931f9f73209
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ab130c3318140887721a68d3d6b25c23
SHA1721f86999f399cb91639a484a89fa5ef1efca92c
SHA2567c8453f63e0cbe77fe83d550711b5e8a2a0eb8ffe69d86b84d428c802e97f8de
SHA512121d59d6646a315ad3d1faf1da992e2af89f52197a90df35214424f2c8667eea1cb48878af31f0acde9267b93a11b4f73cd5f4ea3a3640f4239050f11cc401bc