Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-09-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
cdf06e54c4a9f7bc628964363f458404_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cdf06e54c4a9f7bc628964363f458404_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cdf06e54c4a9f7bc628964363f458404_JaffaCakes118.html
-
Size
194KB
-
MD5
cdf06e54c4a9f7bc628964363f458404
-
SHA1
7f858e89bf39fd34d14da2c022a03e26e7a65c48
-
SHA256
2908c6417bd31dd71db5404aae88c88866e3cc4673e77439e5ffe3fcab88cab3
-
SHA512
6a66c6fdf0244e21905a7e5afbdfb6ceaff0c1baf6307dbc5a2b660e6543dfb0f55e001be70c214eca49a30ee7eed33f5ecd7f050483e385309cab5377d24352
-
SSDEEP
1536:vxcPH1sb59sWb0roj1PiuU3d3dyV4S+f97aEhUX8L8CRwBEuUn:l59sWbtqu3Vn+f97aEhUX8L8CRwBEuUn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5036 msedge.exe 5036 msedge.exe 4708 msedge.exe 4708 msedge.exe 2304 identity_helper.exe 2304 identity_helper.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe 3880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe 4708 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4708 wrote to memory of 4656 4708 msedge.exe 87 PID 4708 wrote to memory of 4656 4708 msedge.exe 87 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 4148 4708 msedge.exe 88 PID 4708 wrote to memory of 5036 4708 msedge.exe 89 PID 4708 wrote to memory of 5036 4708 msedge.exe 89 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90 PID 4708 wrote to memory of 1696 4708 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cdf06e54c4a9f7bc628964363f458404_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcff3546f8,0x7ffcff354708,0x7ffcff3547182⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1193771146816058507,18118238312223691918,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,1193771146816058507,18118238312223691918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,1193771146816058507,18118238312223691918,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1193771146816058507,18118238312223691918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1193771146816058507,18118238312223691918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1193771146816058507,18118238312223691918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,1193771146816058507,18118238312223691918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5896 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1193771146816058507,18118238312223691918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1193771146816058507,18118238312223691918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1193771146816058507,18118238312223691918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2244 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,1193771146816058507,18118238312223691918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1760 /prefetch:12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,1193771146816058507,18118238312223691918,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4808 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3804
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
258B
MD5f5ed4a5752cf6e0c4c36bee00ce95146
SHA104d898b0900b152149f16c6ee7c321a7469606be
SHA256d6d1356d75d6812ee7904a2ed1cab3a1637844dda278cdc47608bcde8dbd59f2
SHA512469bc7e671fb9919564233859a16eb8263919262f862014341a4f89cbf1fff9a7b8e6fc5a8235d076023e70731d612f5081c0ed8a663579f78563752aecbdd67
-
Filesize
6KB
MD592a321f458464a519b7193ede8cf2638
SHA17f995a667ea206d88f1bc50366b1ad6e84eb1ea9
SHA2562e0dfef9c1ec40bdd1563363f8d3a1ad6e66dc9a540743ae43cc2558f431a5da
SHA5128527ac9e0d319f215aec1fbb06d747be997f607cdc10835fd0be51e5b385c3697b0cf228c13c8ebb4799a1c805cf3cb962d5d125cd88be3254055efa400cfbb5
-
Filesize
6KB
MD5f2383cfeffda2936607fd8d8e3fe2256
SHA1571c131e293e22eb48262e60b3841cce1e91e828
SHA256351ac172ad75c9bb2a5c35c87ba122ec0cbac421e5a19ad788282f5c6e8e9038
SHA512ecbd0a954f686722acf83337bad8204c252b0f8ac6708a06844cde574b3b4224bbe06db1f657eeaaeafc780ca786da3825f95f2290b1142644fb803e8e4caa62
-
Filesize
6KB
MD54072ae413df4ca31cd9f085cabe705f5
SHA1a5a466d1a1597b241fd86b98c07cb59bf67b0604
SHA25691c4e16e416efe70cbb71ce29ab39d2f20cae60ff8fbe6f776cde4c693b10d53
SHA51233e166b8eecec98a2f8bb3bc6703e5c60dce922bcea329b31ab2c3ed2ea80fb837d71637645d6d490930379dcfa2749802237c1ae69f460a78f47284c4c0135c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51495059ac05675f923f01e65aeba100a
SHA142b20d1ddca5d833c7e051ddbbca21ac48e2abda
SHA2566696237f96f787a53d7a08006d8cb70b7e9d29051508880b33150599093ac910
SHA51298d0fdd0354dd2f7c3ce458faa6cbdab8a8253d6c4bd6849753d21f36222af6aa9f8dcfd7e444a5bb98c3ef5f3df89aa22c1e55bd5fb828c3190cdda6d2c8403