Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 10:10
Static task
static1
Behavioral task
behavioral1
Sample
cf4d2dd24e63754f122cf757d8740c07_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf4d2dd24e63754f122cf757d8740c07_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf4d2dd24e63754f122cf757d8740c07_JaffaCakes118.html
-
Size
48KB
-
MD5
cf4d2dd24e63754f122cf757d8740c07
-
SHA1
80559e936e250d96c148ed097c5f3be20802ae85
-
SHA256
9345dda3b505770fd509d767cd424d4d0059c70c31be357bbb8303ca9aeb28a0
-
SHA512
81777acda3e78231c19ca4307384f508e2055e8fc3706be5f40c0617e9a21814f6b80a4009b6442109c98544f1eacce4bc55665806e1ecd6efa234d64cdac325
-
SSDEEP
1536:L8IRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZO3:LfOjBJQi1qNEM+99U8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4800 msedge.exe 4800 msedge.exe 2584 identity_helper.exe 2584 identity_helper.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe 4800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4800 wrote to memory of 2176 4800 msedge.exe 83 PID 4800 wrote to memory of 2176 4800 msedge.exe 83 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 3220 4800 msedge.exe 85 PID 4800 wrote to memory of 4016 4800 msedge.exe 86 PID 4800 wrote to memory of 4016 4800 msedge.exe 86 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87 PID 4800 wrote to memory of 3252 4800 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cf4d2dd24e63754f122cf757d8740c07_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd83a46f8,0x7ffcd83a4708,0x7ffcd83a47182⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,15291938662165015662,10287770467859888199,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,15291938662165015662,10287770467859888199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,15291938662165015662,10287770467859888199,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2724 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15291938662165015662,10287770467859888199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15291938662165015662,10287770467859888199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15291938662165015662,10287770467859888199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15291938662165015662,10287770467859888199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,15291938662165015662,10287770467859888199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,15291938662165015662,10287770467859888199,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5608 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15291938662165015662,10287770467859888199,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,15291938662165015662,10287770467859888199,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,15291938662165015662,10287770467859888199,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
308B
MD5220d5f740d01f1c1f583a89fa1a52779
SHA10fdf32e799af83cdfbf78874f7a29b1748bd0479
SHA256eb45222df3baeb626d67a3877426969935560fc4e47c3ab9e0724f49a24efd1b
SHA51270839a63740b995d12f597581cab58c49987031121dab35c7a1f039b955bf748a05ae0a168c0c5d2315ab339ddfe7aaf1e33a725c04fbfaf8935752622b87973
-
Filesize
6KB
MD50926981f2c0bb5c28695b4de7efffd3d
SHA183ed0a9dd04da9f209542ac8f3acb2b0c380b5a1
SHA2568a39c43fe173f6989e08e6917b552f39fabf14a661548f4118964fc51adf1c22
SHA512a0f64c4615cda3580defabbc1c8772aa8e8eaac7247e978c6e048531d2348f9d192b0969ffc9f48237cbc332d693027b5221babfe485354134caaff7b5ee83c6
-
Filesize
6KB
MD5892281c1dbe6d9d3d33518116a469ce4
SHA1d9b3668c6f5e06e6283c4c738362c421c15e9fdc
SHA256f7991c2cecf668ae107bef6b4f8ec4d37a8e7ba91b9dafcff128eff95d141e44
SHA5125e744c5cf1e5f919ecccd5b7724ef043c2cd800dfe8e08d1229931f07482a71277628ccdfa27655738fec7766ffae620b71cdc47277869e30e3957eda90104f0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e06ebe20-302a-4037-836a-1d2c84dbd1b3.tmp
Filesize5KB
MD5ca1e3ea2533fc7e0eaecc18a46d2bb25
SHA18d3c32902ba5bde0e49b67498e1e3b684ace4efc
SHA2567d4af276960beada8e02511007c571201cb5208b9cbc7aacccc69b544bcc7e9f
SHA5128f1e552fe462f491431fd8f0863356c00896fb2461cf264b28d9c5be20f00560e398af344e4fc15ffa173b6f4d6e437a9a2b44c3ab1898d57ee9c050f2385444
-
Filesize
10KB
MD575aaf92f7519eb0b87ba03ba8bda2e53
SHA1942028616e5d3f57bece8b3a19b4577fabc9e929
SHA256dd3c93eb9a29dddd8e9b317e8529c733b4bc2a8bf0e772a8d38ad5977c60d541
SHA5129bc0c491312ac0fb09d066ee35ad2063dfcf92e43558b86ddb6c7733cadc07e7c1e77c8ec3028e6e4d989f0ae00afd46e81f8235ce03974cdc5ad8a7ddc9d391