Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 03:57
Static task
static1
Behavioral task
behavioral1
Sample
d105cc3f896f321afaa57c10b23f5c31_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d105cc3f896f321afaa57c10b23f5c31_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d105cc3f896f321afaa57c10b23f5c31_JaffaCakes118.html
-
Size
100KB
-
MD5
d105cc3f896f321afaa57c10b23f5c31
-
SHA1
c5aa648aec122b617fb2fc3cd8b27468bb3056d2
-
SHA256
444cc4898dbe1accf05e84f49d3cf64ad552c81887483ecbbce656068681cb57
-
SHA512
ddee1a076aa711e0a2cde90ec5b65a80f93134de4a3c4b097e16ec4e8ea80507032a3ef0c40364c1c9e19e1abda2acbc6d48eb614a1027fbac3973bb9ac836ca
-
SSDEEP
3072:vnOjBAtVWrCWkHWRSWJ5WX3WYFWUUWrVWvTWBNWDWW1OFCe4HtOPxGNFYaT:v9hJZaGfWcUO77FW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1600 msedge.exe 1600 msedge.exe 2964 msedge.exe 2964 msedge.exe 4844 identity_helper.exe 4844 identity_helper.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe 2964 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 1828 2964 msedge.exe 83 PID 2964 wrote to memory of 1828 2964 msedge.exe 83 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 3752 2964 msedge.exe 84 PID 2964 wrote to memory of 1600 2964 msedge.exe 85 PID 2964 wrote to memory of 1600 2964 msedge.exe 85 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86 PID 2964 wrote to memory of 1580 2964 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d105cc3f896f321afaa57c10b23f5c31_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffea18146f8,0x7ffea1814708,0x7ffea18147182⤵PID:1828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,13370660654221318618,16338348019098510528,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,13370660654221318618,16338348019098510528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,13370660654221318618,16338348019098510528,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:1580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13370660654221318618,16338348019098510528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3116 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13370660654221318618,16338348019098510528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,13370660654221318618,16338348019098510528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,13370660654221318618,16338348019098510528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13370660654221318618,16338348019098510528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13370660654221318618,16338348019098510528,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3956 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13370660654221318618,16338348019098510528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,13370660654221318618,16338348019098510528,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,13370660654221318618,16338348019098510528,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
191B
MD56bb0e1d8bab7ce211a058d8817f73035
SHA1125a3b2a1187f2f70351cfc97c8b88d4094ef05e
SHA256ff92bc2ea67f586d5de3bf6d0d22651fbc091b1e6fe822a8f003df5e1d27e888
SHA512b592ad470dfe2cad76587bfef3afab3dcfa836d00a33cf7a134fec0f3de77c86e27f225e1d2a40be27a1c3ef662e83fa510052c1dde824d2d510ec25a8c18533
-
Filesize
5KB
MD520fc0cc711d1e70a32bb1ca4c6502269
SHA1dc1dfe35cf5532f7f028503cb80bda99520f876f
SHA2563400b17b78f24b71c6722f734358d5dc739cfc3c733f8eefcabbc5dbc20c0d9a
SHA5129fa7b4c6040455a3979b777d37a0973d062597fd81879f5c7ff1be745320cb2fc83c66151a94351dfa0a7502a18ec23d9663999f35ca284540e0fb3e0ba8f8ea
-
Filesize
6KB
MD5fb8a62be4f4b5b0ed1fc7078c4833555
SHA14918ac10f4e8eb739cb887d3c60a1b0b1969f900
SHA256890cb53574e65d079d8686c445fe022e5106f3b416823e0957d4317f7a79c98e
SHA51211a8caec1ad4f914e81a917618dbb6cecfdb4daa6e87c72aac472fb386c4b9f687f022e3513488f17aeb424a8a0a22032b91c7f23f45788cd4b58af9468339a0
-
Filesize
6KB
MD5683426aee9ffec0a6154afe1233670d4
SHA136eda3e7a89dfee833c779bce2b3074d7c4d917d
SHA2566d0caef01a90e27fa5b7cd84a714b19861278f079638cba8abc6be3dc0e2dbd8
SHA512d42c95f1e95764b11955c8e273f33f3476ad794446670343369b05eaea7fb7bdbe473cae9a15d65ceff8cb742e84aa0ebc53ae1dd1f349bc85551deb748d2d97
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD526377651f39d75efad16c70b46a6cc9a
SHA1d0b0ffb7fea4eb09f7b1e06a64137262dcc22690
SHA25695679565941263050bd5c4ad9f47a71b44eed8443f82a8481e94bfefe3fbedc2
SHA5125de092f658dec0e635f0bcc23a38aaf89df8e578fcef1ce4d0fef8bf43fa877344e56a2182d13576adbb837a9b5e9d324cbf886a65e6ef12c7da6d4c341c0bc7