Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
d2f495910dde5e24920557e295ae6248_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d2f495910dde5e24920557e295ae6248_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2f495910dde5e24920557e295ae6248_JaffaCakes118.html
-
Size
36KB
-
MD5
d2f495910dde5e24920557e295ae6248
-
SHA1
6645d72bf6b903a094bfb5fb9e69ad71fa77a4d6
-
SHA256
38e5395a190c4633bbe5e291c37456e0beb07df6c72f1d29b3e130c1118efa1d
-
SHA512
32d0dc481f5bd484a970d1b4e224a0b3bdf0b5d0ad1a4e6ff60d3ee0e9ce04b6a0d9419b1f9386a77ef2f55dc95c55c9c0a0ddf3663ee935bb016f9637bcd8ef
-
SSDEEP
768:zwx/MDTHIS88hAR9ZPXIE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6T8iX6DJtxo6qLRL:Q/PbJxNVEuxSx/d8hK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4596 msedge.exe 4596 msedge.exe 1040 msedge.exe 1040 msedge.exe 656 identity_helper.exe 656 identity_helper.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1040 wrote to memory of 4676 1040 msedge.exe 83 PID 1040 wrote to memory of 4676 1040 msedge.exe 83 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4852 1040 msedge.exe 84 PID 1040 wrote to memory of 4596 1040 msedge.exe 85 PID 1040 wrote to memory of 4596 1040 msedge.exe 85 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86 PID 1040 wrote to memory of 4872 1040 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d2f495910dde5e24920557e295ae6248_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0xdc,0x7ffe899d46f8,0x7ffe899d4708,0x7ffe899d47182⤵PID:4676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,12631293842783160040,17094628561026182413,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1996,12631293842783160040,17094628561026182413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2536 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1996,12631293842783160040,17094628561026182413,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12631293842783160040,17094628561026182413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12631293842783160040,17094628561026182413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,12631293842783160040,17094628561026182413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1996,12631293842783160040,17094628561026182413,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5400 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12631293842783160040,17094628561026182413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12631293842783160040,17094628561026182413,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12631293842783160040,17094628561026182413,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:1208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1996,12631293842783160040,17094628561026182413,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1996,12631293842783160040,17094628561026182413,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1348 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
614B
MD5bb980b59d51218b3300ac441a12ab8cc
SHA116274387c1da658f61c04817e5fd730bf5a483a1
SHA25617ca4eb0bba0e48150df5dcbe112478732d446da03c677c8aa2ca1c7de6ef32b
SHA512e36917b0b5e62c7cd2d47e2736de3bada5a536309ce7b4342db564053268d52450d600df62bd5b68293b26b0d1a028e5245513c67efd820f5d4898ea69610738
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD54c61df93f49eb39c52ea3d9a495e8505
SHA1308cc95130d15fd5168245a01ae16e364dad5167
SHA25602a685f6ce44451710964335451c0e18363d63d8f168ebf661c5e72d2f7752a6
SHA5124b4a2389061a65afc45d3b628c2623fa9d1518b56792a23d67f1a024cc2b89d1d9f85cc124ed2e391e48452b2f1583fa3c1635a0f8b0e0be65e259a305e6fc92
-
Filesize
6KB
MD5c52bb3d58a44ccc9448f292da2ec9d80
SHA14d9b484b19303749be7ec25b48322961ec9a2ad4
SHA2565ec8a3c8fd07f429a0a66fdb02315609153fe6db3e510c9e3907796fef6e3ef4
SHA512f019dfc96121805ef62bf08723e8271e124f8c097dbd6539ad6e03d6b1ce66af2b8d235288d6bf37f2c8c46d174ea436c5edaa36031f94cabc6cdd110c7c011f
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD50f1c3b460317a43438141868b40006dc
SHA1675dffadbf47c68d742268acb52d8c2d79396122
SHA25692a4cd3f5a324730280a6fed95b37119504f6389701137647a3ed4a5bd85df80
SHA5125446863d44a15d221ecffac5eaf97da122d3d70d6594a9aab4f4088100a4dd12a250982853b470c49359c238b89e782390358fa163bae137dcadaa139f19952c