Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
384d9b4db64120866f06b7b3e6cd6b48_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
384d9b4db64120866f06b7b3e6cd6b48_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
384d9b4db64120866f06b7b3e6cd6b48_JaffaCakes118.html
-
Size
58KB
-
MD5
384d9b4db64120866f06b7b3e6cd6b48
-
SHA1
00c600ef0e96a2d17f8518292b704445c051a8cc
-
SHA256
d532d323f1e03eba7cc1bbe00f69d5f2a1cb7bf4226002b28554ab309adb195c
-
SHA512
2a0115c4eb8405ee3b3d03a7ee4703dc50aa8b26be36714b4ecd2f2dad26c9d33fbdd402e161c041a46b401ab62cf058ec2fb2f5690ab85b1ef9d12ae9ac7f57
-
SSDEEP
1536:flB4UskpIedOQ/6apxcz6n5kZZUsiKDqiHcPXO40oGI9a+o+bqRTpzNN/Qqu5/l5:z4GXjF0lhXoIkgcoo
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 4864 msedge.exe 4864 msedge.exe 4800 identity_helper.exe 4800 identity_helper.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 2484 4864 msedge.exe 83 PID 4864 wrote to memory of 2484 4864 msedge.exe 83 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 5008 4864 msedge.exe 84 PID 4864 wrote to memory of 1080 4864 msedge.exe 85 PID 4864 wrote to memory of 1080 4864 msedge.exe 85 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86 PID 4864 wrote to memory of 4692 4864 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\384d9b4db64120866f06b7b3e6cd6b48_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9549c46f8,0x7ff9549c4708,0x7ff9549c47182⤵PID:2484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,18395659420121258599,15120271279587686348,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,18395659420121258599,15120271279587686348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,18395659420121258599,15120271279587686348,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:4692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18395659420121258599,15120271279587686348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18395659420121258599,15120271279587686348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,18395659420121258599,15120271279587686348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,18395659420121258599,15120271279587686348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5464 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18395659420121258599,15120271279587686348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4212 /prefetch:12⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18395659420121258599,15120271279587686348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18395659420121258599,15120271279587686348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,18395659420121258599,15120271279587686348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5064 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,18395659420121258599,15120271279587686348,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2448
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD575c9f57baeefeecd6c184627de951c1e
SHA152e0468e13cbfc9f15fc62cc27ce14367a996cff
SHA256648ba270261690bb792f95d017e134d81a612ef4fc76dc41921c9e5b8f46d98f
SHA512c4570cc4bb4894de3ecc8eee6cd8bfa5809ea401ceef683557fb170175ff4294cc21cdc6834db4e79e5e82d3bf16105894fff83290d26343423324bc486d4a15
-
Filesize
152B
MD510fa19df148444a77ceec60cabd2ce21
SHA1685b599c497668166ede4945d8885d204fd8d70f
SHA256c3b5deb970d0f06a05c8111da90330ffe25da195aafa4e182211669484d1964b
SHA5123518ce16fef66c59e0bdb772db51aeaa9042c44ca399be61ca3d9979351f93655393236711cf2b1988d5f90a5b9318a7569a8cef3374fc745a8f9aa8323691ef
-
Filesize
6KB
MD511d4f7a73d276ff8b0cd3907ae230ff3
SHA1d87bfcf8953f198376e6910c9c59abce6a52560f
SHA2564f40d6a891a3bb4157e15569350ba782a1d1d3c9ca7eabd6ece1a21e10afda8f
SHA51209e0544ef60dd47c22d2e5ccab2acb751135127806e51d077a7a6b6056f43988ce4b089f5ab4f65089b2b4591019a424fa323399274d5da0a6974aa30b2552d3
-
Filesize
6KB
MD5a9483f78c485ccb22876b89cd186c8af
SHA1df27db877a4e4f29b71c870a060299b78c3582f9
SHA25697fe89b22632a585dc1df739779f5d2096ee49a17265f4258ee7f3c2792bf027
SHA5124ec1e51798d9198cc07cdf418f62a79d9566d9c81918f1552c191ebb19d50f397401c7e5d9049dfc3d8eef9ec64912d6792f33b7ad9f36cc51ee6b92e37cafcc
-
Filesize
6KB
MD57c22ddfce1c5cbd2760ee709cb02d247
SHA1bf578c0afb2021ed7497057399c139518468512a
SHA2561c09dc38210a871744a0b7d53d3cabb3e12d599ff96341759f92dd5957824d37
SHA5129118ea0db58797a474366a683a72894697c597a4c9d8d002b51009a6bc87af4596d1c542f3b49492458cc2a04e74ea251228835a6c9f08a4cf1877f175ac59d1
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5b9f24eb10c5e16d23907f5fe450702ef
SHA1fefb6e4760a89035c742d8b79ec054081e6a6e37
SHA256649a1caaada106aa9f2bf10c9d4315ced4ff1c6ec6832e36f7bba8b3e00653d3
SHA51208d6e765dcb64d42b145d6274957d1ac61dd08332c9d2b2c1fdc727f4ca5e3a658f2e99fb130f3fa52f517656c685dae4bcf8e477e78f0eca274c81dca913578