Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 17:22
Static task
static1
Behavioral task
behavioral1
Sample
09d4d2b054131837068ddacfdc1f1d46_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
09d4d2b054131837068ddacfdc1f1d46_JaffaCakes118.html
Resource
win10v2004-20240508-en
General
-
Target
09d4d2b054131837068ddacfdc1f1d46_JaffaCakes118.html
-
Size
57KB
-
MD5
09d4d2b054131837068ddacfdc1f1d46
-
SHA1
514b03e2d6d571b4f5fb678f00c5b7a5d9f7ea06
-
SHA256
ca9d0065e00ea33ed02d61fe025a00706e5d19fe313ac5ea78ef7243885ffcc4
-
SHA512
031f4cad26c861dceb9146afd4dade09ac2b1bf1fc519a099d7f05e36273e6a42cfbf5af7db805805ec8bc62e0a2e2a2ceebb6b81d55f09490fe1255f5277ded
-
SSDEEP
1536:gQZBCCOdI0IxCWDO84fEf7f1fpf+fHfRfLfIfDfrfMf9fVfRf3fUfKf6fKfafUfa:gk2O0IxOMz9xmvZzgrz0ld5vsSCyisd4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2772 msedge.exe 2772 msedge.exe 2460 msedge.exe 2460 msedge.exe 4700 identity_helper.exe 4700 identity_helper.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe 2460 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2460 wrote to memory of 3256 2460 msedge.exe 80 PID 2460 wrote to memory of 3256 2460 msedge.exe 80 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 3672 2460 msedge.exe 81 PID 2460 wrote to memory of 2772 2460 msedge.exe 82 PID 2460 wrote to memory of 2772 2460 msedge.exe 82 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83 PID 2460 wrote to memory of 2384 2460 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\09d4d2b054131837068ddacfdc1f1d46_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe676e46f8,0x7ffe676e4708,0x7ffe676e47182⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4196 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5056 /prefetch:12⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5124 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,2552952982275950474,5319906876892809129,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ce4c898f8fc7601e2fbc252fdadb5115
SHA101bf06badc5da353e539c7c07527d30dccc55a91
SHA256bce2dfaa91f0d44e977e0f79c60e64954a7b9dc828b0e30fbaa67dbe82f750aa
SHA51280fff4c722c8d3e69ec4f09510779b7e3518ae60725d2d36903e606a27ec1eaedbdbfac5b662bf2c19194c572ccf0125445f22a907b329ad256e6c00b9cf032c
-
Filesize
152B
MD54158365912175436289496136e7912c2
SHA1813d11f772b1cfe9ceac2bf37f4f741e5e8fbe59
SHA256354de4b033ba6e4d85f94d91230cb8501f62e0a4e302cd4076c7e0ad73bedbd1
SHA51274b4f7b24ad4ea395f3a4cd8dbfae54f112a7c87bce3d286ee5161f6b63d62dfa19bb0d96bb7ed1c6d925f5697a2580c25023d5052c6a09992e6fd9dd49ea82b
-
Filesize
5KB
MD5064bf2897003b15e43c9a76737ae05c2
SHA16c999e257d189cfbcedd744ba2b977393bbd2d70
SHA256d9473825b22c8c2b4b9dc29e03764507096d96e296413206d09086d0be074f8f
SHA512cd0dd3babd5ac2100ea361b6e311dcf3975def00772434613939cdc879bf2a77dc7b4a73d146587ff7b048ceabb4212659d6c975167342f4d3f3851f8d38854d
-
Filesize
5KB
MD5da97f442a9a35b104756db41efef26a7
SHA1ec4f46861715f4a141f6fffb90a9774708ffaaa5
SHA25634de06d293a6e855fea058b90659027248439898c4da2a82f42c97a07406cf48
SHA512580c06ccf8010250dde142b2131f43e61f8ff4d835caf4234f5b8696c3f19d5f082478ca3419664a90d6c1931a53dfad1b8a954f8bab4135635f917fccd6a651
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5b0f678405c2509f11f85a7d4b65e3792
SHA15c08d0076d9fbe57024233095c531dae1bef2a59
SHA25649a130744a1ef27131510efb976a68bcb90e0f25cccc42973b22dd2fd9ffdad0
SHA512cbacd591ee7b605cd2182d5dbbaa48d30f9be2219fc42d4b5ed92aa0ebfb12527bc90930b1e5d56a51d6599d326cadff3b04df12b910a55b4b4d0c8e1b5ab212