Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 21:56
Static task
static1
Behavioral task
behavioral1
Sample
d2eae3915afb75c38e40466644303ba0_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2eae3915afb75c38e40466644303ba0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2eae3915afb75c38e40466644303ba0_JaffaCakes118.html
-
Size
57KB
-
MD5
d2eae3915afb75c38e40466644303ba0
-
SHA1
77eb4e67fcc02de96847d56cf14dabf4787bb12c
-
SHA256
13b56cca253e2b3780cf9bcad02482f899bee5d57eb1a36ba00c711ae337d78c
-
SHA512
263bd3313753490a04d33ab3b5e60c41e21171b6173a7aec900668aa09e5768d4c7e688a63d5ea639d39b3cce3f19ff61fb3a23e859043f7784d0ca592e26055
-
SSDEEP
1536:gQZBCCOdH0IxCYqiJf8fNf9fif7QfYfkfPfQf9fifmfkf6fiftfIfLfLfqf0fafC:gk2R0Ix501l6sgs3IVqesyKlwTTSciAL
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3816 msedge.exe 3816 msedge.exe 1800 msedge.exe 1800 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe 2320 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe 1800 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2104 1800 msedge.exe 83 PID 1800 wrote to memory of 2104 1800 msedge.exe 83 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 2628 1800 msedge.exe 84 PID 1800 wrote to memory of 3816 1800 msedge.exe 85 PID 1800 wrote to memory of 3816 1800 msedge.exe 85 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86 PID 1800 wrote to memory of 3244 1800 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d2eae3915afb75c38e40466644303ba0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfff146f8,0x7ffcfff14708,0x7ffcfff147182⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,12568456280889892421,2174273382907847282,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,12568456280889892421,2174273382907847282,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2328 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,12568456280889892421,2174273382907847282,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:82⤵PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12568456280889892421,2174273382907847282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12568456280889892421,2174273382907847282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12568456280889892421,2174273382907847282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4548 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12568456280889892421,2174273382907847282,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,12568456280889892421,2174273382907847282,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5b2136c5d4c0572303138819ec8de88fb
SHA16ae2ea8e691dbb4ec2a9856faf8fb7abe939c703
SHA2562f4df984d649490b1146702acdf81e995c0e1405e867ac1656adfff905b9c55e
SHA5128b77bfec0a9aab68342b129147c275cf02ee9ccf5de248ee1d9a491894c2847ec1b87e8e7d916b4297655ce67b805afc797bb1d376b651f8460801a7579688ca
-
Filesize
6KB
MD5d0b6923f16724065e4f393f994375588
SHA103db4e372785ed61c2a09a9a21de23d1f2b7130d
SHA25626dbec940d7929f45f351c307d520ac7d37f02342bc56eed3728b7a6d9b4dcb8
SHA512f4a98b08474a61ddeafbb3013ad537d430dc039ad5d4a4f0e177587f9b4d4f4cf7fcb1ea97b38547db4d097c1ced435f16373136d398e4a7743df1263f91150c
-
Filesize
10KB
MD5b9a4e3b881601e564e9c22bbf83dd9b2
SHA1e25f3034487b6bfd6f1043f87fd315b043820fa3
SHA2568f0ebf5b9870438f0fef703bb78d5f2a295b6bc273d844795b33dcf76eca8523
SHA512dacfce43e503a9e68b0583beb11f4dedf8e0923b219086d2f359c56077c58c22dcd4ceeee5f87829cce917e5939337b27c18434c91f7ec30a731b2bb5b449cf7