Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
d12c4022d432526d2f5cea2f3cbd2bcb_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d12c4022d432526d2f5cea2f3cbd2bcb_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d12c4022d432526d2f5cea2f3cbd2bcb_JaffaCakes118.html
-
Size
40KB
-
MD5
d12c4022d432526d2f5cea2f3cbd2bcb
-
SHA1
10cdbb06cfdba96286a38d6a47d6cc373723af7e
-
SHA256
42f5d1fa6dfd3b4a3467216654503e6f3a6dee06666659d8b94829f1f1770aa5
-
SHA512
22674416fcec0c74139124fd055785bf22e5c3b100385be9d33789602f2469c4b3e22904cee78e5c4210145dbe82301c0f20c445dca3e3094ec3c1d73e57b9c5
-
SSDEEP
768:F1Cx8s2xf02Dqdb4/B9yab+K9EYyercmg:F1Cx8txf0s37i7mg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2344 msedge.exe 2344 msedge.exe 4436 msedge.exe 4436 msedge.exe 4836 identity_helper.exe 4836 identity_helper.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe 4436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4436 wrote to memory of 680 4436 msedge.exe 83 PID 4436 wrote to memory of 680 4436 msedge.exe 83 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 4860 4436 msedge.exe 84 PID 4436 wrote to memory of 2344 4436 msedge.exe 85 PID 4436 wrote to memory of 2344 4436 msedge.exe 85 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86 PID 4436 wrote to memory of 3020 4436 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d12c4022d432526d2f5cea2f3cbd2bcb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9542046f8,0x7ff954204708,0x7ff9542047182⤵PID:680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,7367353749283601983,8959770044511107000,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,7367353749283601983,8959770044511107000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,7367353749283601983,8959770044511107000,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:3020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,7367353749283601983,8959770044511107000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,7367353749283601983,8959770044511107000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,7367353749283601983,8959770044511107000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2140,7367353749283601983,8959770044511107000,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5420 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,7367353749283601983,8959770044511107000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4012 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,7367353749283601983,8959770044511107000,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,7367353749283601983,8959770044511107000,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,7367353749283601983,8959770044511107000,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,7367353749283601983,8959770044511107000,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2704
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
178B
MD5dcd81bb0d88694487b34d04bbafb8371
SHA199a2d400ad8891ef75546f814edf8e68bf80b927
SHA25613a79fd27765697b4fb7fcb150236a351cb662ef5ba94f6fc519154df0b2850a
SHA51248994d07b2e81708e2396080a67cf88f29bf360ff56c14f3f755ea11a386bf513bb293b5c69fc741113ae775ddd9744ab31433024b5469fe83f444cef13dbf59
-
Filesize
5KB
MD520bbfa5b2e76a8bd9e782d6726fc3322
SHA121cfcc96ccb4b7b23e522f108033b4386897763f
SHA2565f5c18efebac6532f4540c4bb7622a0ea06570e7a2dcee85dc4cd70da775e6c9
SHA512504161dd0270aabaad3bde2ff118e3969b9ba1a79209eec822844ca3f2fe19c4b22dddf646da3a7bd7650f0c22dc42a2f552175f3d012676f7e0143b3b166ad0
-
Filesize
6KB
MD5b50490c1ecede47acec4286377a6e2f8
SHA1c86918d9d6e72e0332604b1f5fd382404ae1f952
SHA2560e5cc5e65a8ca287c7652f251f095caa7330b696ea2381d89738b1412c0c9d02
SHA512079aea335796202dcb093145386bc727807f5ea4fb9d3b9025904889c099709aeb673fca924ba9323eb34fbdb6e5e33eb8bf59c7e333b9733c4ec11be7ea3c18
-
Filesize
203B
MD5f9c1f15abda628c00f264684b82dffe7
SHA1c10d3a7c9c71fa34afa294c6f7111987b36b97da
SHA256cd352f2f16843ee127e825e907b5dd8c0961988f6c58eb17a3ee3246ebd900bb
SHA5122165ec84cb725cac39a2af352fe716b49ad5193ee604b45938b8824e4a3eafa3dd94dc44bf03f331f1f763dcec8d2a5dd6e730db4434b860cc6fb5d876e7f4de
-
Filesize
203B
MD546c2573c2195660f72a69bd7b6a7364d
SHA16509db756ed8c8f7cb1103683cd780a12275fb2f
SHA256e49db9879772b46780a34daeb27bc2eeb8423c663adab73c6dde81cc1bada5e3
SHA5121c15c26bd5f3a0ca0f49e532976e7a73b9c7c4479f9c01e22d2a7cff9031e508405d19ef6f33ab3e65574efee3759310bd94fe83124d8195af988bdde20a236f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d231e9155d65e222c3c12d45fe787c5a
SHA1a393cc42a8345293e0dc1de445d3fd6cee657397
SHA256758ac1f7738fc6b37a2e8c99d322234e611644cbe1fdfd47ab27642aed03ac0f
SHA5120e1cc3119c4a997a83db2fd3d907d83faa8fb0f0deaff3677b2b7ecb76b7d4b0382de593023408cdb9b9ddb28c76de68121e6abdeac13f59f503cdebc4f2931f