Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 22:24
Static task
static1
Behavioral task
behavioral1
Sample
d2f5366984599f8d50fa0462c18ce3b2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d2f5366984599f8d50fa0462c18ce3b2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2f5366984599f8d50fa0462c18ce3b2_JaffaCakes118.html
-
Size
30KB
-
MD5
d2f5366984599f8d50fa0462c18ce3b2
-
SHA1
84da7b8bd9658420c58f5f2c721562645249b76e
-
SHA256
7ca20d03471f984f84ad099f45217489f2ceae940bee8d8336785a7e3478b26b
-
SHA512
d7a6b356e9727eb624ef55baf520f20749e97ea8b8ea7c7662b0f36c9dfbadfe5ede1548f7369d904a780cecc53044f5b0763cfaa1a4f47ae2663b78ebccc386
-
SSDEEP
384:dAyBxPEF5FtzE2fWriy4mgEVyRouzlEmkSHTp:dbxPMzEp4LRouzlE+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4268 msedge.exe 4268 msedge.exe 412 msedge.exe 412 msedge.exe 4988 identity_helper.exe 4988 identity_helper.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe 4444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe 412 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 412 wrote to memory of 3536 412 msedge.exe 83 PID 412 wrote to memory of 3536 412 msedge.exe 83 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 3520 412 msedge.exe 84 PID 412 wrote to memory of 4268 412 msedge.exe 85 PID 412 wrote to memory of 4268 412 msedge.exe 85 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86 PID 412 wrote to memory of 4544 412 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d2f5366984599f8d50fa0462c18ce3b2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb022d46f8,0x7ffb022d4708,0x7ffb022d47182⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,8993003888916494725,7737166749507657705,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,8993003888916494725,7737166749507657705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,8993003888916494725,7737166749507657705,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8993003888916494725,7737166749507657705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8993003888916494725,7737166749507657705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,8993003888916494725,7737166749507657705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,8993003888916494725,7737166749507657705,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5748 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8993003888916494725,7737166749507657705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4612 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8993003888916494725,7737166749507657705,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8993003888916494725,7737166749507657705,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,8993003888916494725,7737166749507657705,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3572 /prefetch:12⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,8993003888916494725,7737166749507657705,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
6KB
MD569eb4eddb5596d6de00ef6960b63204e
SHA17372ba67db0ad723b3703d67d0ae29e372deabef
SHA25611fa7502ae77199263e1713653e688b893b1e0b50a68ba97c1a4b684291e4370
SHA5123d3df8a319c231b0442c2f7ff4c6809dcfbce801c7c6fdffed2250949a354e6f943250db6c48715294bf23614a00e386d07ff877ed163540ad445eec672a6066
-
Filesize
5KB
MD5bffa2b06a9dfafc004af111f32621d16
SHA165404a9025a923e5541ea0345517e40c2fbc4b41
SHA256a3a09c51c5435ee3ed981e40ed18434d7c90903f8a5f747092e46e02836d2930
SHA512f1e90d06a41d1d33deabfd0aa5e915a25e1d174c4d267de150f3043ddf636cc792d148ba616ac188baa45b3c87a3fbf71e6c36edaef771062851abc69f7ddfc8
-
Filesize
6KB
MD54bfefbd79943920e170d53303bf62058
SHA1dcb00ec5196675e3899039d475489ebdac22a232
SHA2560185da9e91a0a47dbbaf9e921df2a518a48ee172ff69f50612fe826728ae952d
SHA512f338aa1016a7864c346e823f6c61addb2b72c5328a8eac0d797f66c98c8816ba557be3663a251e1724070df7f515f8eca578fdf7d99d740a4edf59fab00adc16
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f2e947fa57e2b4842491d2d7fe51be9c
SHA14874006736b034133a5598ca83155202cfec8201
SHA2568d54430c2bb127e97c320698379489040a803e8de447f8d2cc0edb05d3be4c47
SHA512dc0cc9b1eff714f1fc8decd9b84935d71d076ba16ba146759f94771b176f45e1c8cadf85369c429f682016dcbc4737f3c5657447edd93fa5d2f58f768045e104