Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 02:49
Static task
static1
Behavioral task
behavioral1
Sample
d0eb441c9c5fee11f7f29b994a8d50cb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0eb441c9c5fee11f7f29b994a8d50cb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d0eb441c9c5fee11f7f29b994a8d50cb_JaffaCakes118.html
-
Size
43KB
-
MD5
d0eb441c9c5fee11f7f29b994a8d50cb
-
SHA1
83804ea6dd3dd408fec3cc6e8c33ddc1ed2372f5
-
SHA256
be785e33635836b290dc6b8de3bf46a4a0cf90ea1d95e2c4dd34a5c41f58f500
-
SHA512
b8d23e1c063ad5771d41b07f20438e02986a0d425d6edf1357ea1b78cf869528ffa0068da9b7d21856e248dad501d539c3eaec67e1b684221e22af773bb93f65
-
SSDEEP
384:Bob4Z7XezirHApb0D+v+fuJ6jm7am6KTj9gqquP2pR6C4QPWX6zdagmwAQHyZ8Rq:BOsRYb0D4zl7q4quJsWXwAdnEA0E
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4940 msedge.exe 4940 msedge.exe 3668 msedge.exe 3668 msedge.exe 5068 identity_helper.exe 5068 identity_helper.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe 2356 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe 3668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3668 wrote to memory of 2868 3668 msedge.exe 83 PID 3668 wrote to memory of 2868 3668 msedge.exe 83 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 3568 3668 msedge.exe 84 PID 3668 wrote to memory of 4940 3668 msedge.exe 85 PID 3668 wrote to memory of 4940 3668 msedge.exe 85 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86 PID 3668 wrote to memory of 3652 3668 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d0eb441c9c5fee11f7f29b994a8d50cb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcde2346f8,0x7ffcde234708,0x7ffcde2347182⤵PID:2868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,6802126060245118268,14987072424985740594,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,6802126060245118268,14987072424985740594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,6802126060245118268,14987072424985740594,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2904 /prefetch:82⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6802126060245118268,14987072424985740594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6802126060245118268,14987072424985740594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,6802126060245118268,14987072424985740594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,6802126060245118268,14987072424985740594,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6802126060245118268,14987072424985740594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6802126060245118268,14987072424985740594,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6802126060245118268,14987072424985740594,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4024 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,6802126060245118268,14987072424985740594,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,6802126060245118268,14987072424985740594,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4884 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
184B
MD5bf47a61009321e081f3babde283f99fe
SHA1a7673f4818328cd610d01b0bb126537acc958abb
SHA2567f61221037811fadec0a921926afa442b9297cc28d8b1977cf731e635b6b5ac3
SHA512fd2f121921460af2760ded863c404675616b771d43869d966e8804cda531bbe2fdbaaed57ca8bcd7ba8756608f585787852d2bddbe7ccf25a5a9be7c1c366e51
-
Filesize
5KB
MD52e7d7aa404a9d1e09ba00663f39b0bca
SHA16c3fc829cb17c45e7110e73fa693367aa0077d8c
SHA25688d8876beed92167935f69a6423519e4be275517d3a56a1867fb0fc00cbfff44
SHA512e29c8daa0a5ae70e211483d59b09fd4a6e8d15d452d4cbef1bd326c4711a72b785922b87c88791c9df85bcf4fc0b7562814a99da1928d729e9c00d72825054e5
-
Filesize
6KB
MD5df242ef99c34323b3c78e60a9fc0b039
SHA1c137d55ee201c6fc5946c0594922584927c5e989
SHA25675af4d63eb7e7f064e5044ea44f406d9f3ca3ea5a908d5c2836b84db9fa94cfc
SHA512763084edfee9313eba3df32fbcb8c369173586e3b073dbd651255141cc102dc9d23bfa343347c9e9a88c707c2476e01544eb43c03d747abc908d3df8a6eb4a88
-
Filesize
6KB
MD522436f9f6fef2ca7fcc45e936397adcb
SHA12f512f30aa3ffd5ec457255443df9349fe459803
SHA256305cc95295db5a28a9283a80a1700d415fb5327b6506e283c32ebb4e6f22e31f
SHA5127191b5c5a16e35b9734dc059f0ad5a9dbdc3b3c7e5feb89b7f87e17ea4323c40fec96156860faa8cd61639f97f5d9f99ab23e313a9565f4bfdbc65b28ecde98e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fe7b75e7d7cfe02f784d6bfc0b4baa48
SHA178aec7ff55af8f0d3e01e00bd24f310fc9bb57b9
SHA2567ed8c6dc321cdbfc6fd38b8d2802fab919453a0d434aae19fbb34e77ceee0a2a
SHA512ef0dcf6c6cd83fb5c7325b84ba8b4d7ec42c4313c63165cadff8d688e411c221901b1b092fe8ea9969b365aedf692a3c166bb619e70c441c1c09f1c9c0fa130c