Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 07:59
Static task
static1
Behavioral task
behavioral1
Sample
d172135ff9925239cd6df90e2ad88e95_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d172135ff9925239cd6df90e2ad88e95_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d172135ff9925239cd6df90e2ad88e95_JaffaCakes118.html
-
Size
5KB
-
MD5
d172135ff9925239cd6df90e2ad88e95
-
SHA1
f451e3cf6d7507c5ea3285b264c9aca8257d368d
-
SHA256
fe5da5eaa8b9950f52f148925af0b3f72fb7e894ca2f5ed1385f086a5be2b26e
-
SHA512
91246a0cbcabcc807d725f2c14c3561758ef634759c115b9fa05df64e92c04be434b266d72afe2cc896fe41a3bbe1bf2f2f148c3034c92a85042fe9fa4d06875
-
SSDEEP
96:Y43nJkBc0CmWMahUxwTUfOR50sB/0STxjTapJNlSCoys0sjsrr00sExk6qItv1xq:T5kBEmWM2a3mR5t1vNHs84k6rxq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1920 msedge.exe 1920 msedge.exe 3472 msedge.exe 3472 msedge.exe 4072 identity_helper.exe 4072 identity_helper.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe 3472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3472 wrote to memory of 1884 3472 msedge.exe 83 PID 3472 wrote to memory of 1884 3472 msedge.exe 83 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1904 3472 msedge.exe 84 PID 3472 wrote to memory of 1920 3472 msedge.exe 85 PID 3472 wrote to memory of 1920 3472 msedge.exe 85 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86 PID 3472 wrote to memory of 1888 3472 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d172135ff9925239cd6df90e2ad88e95_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0b4346f8,0x7ffa0b434708,0x7ffa0b4347182⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17747387871974505339,5434014615850959851,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,17747387871974505339,5434014615850959851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,17747387871974505339,5434014615850959851,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17747387871974505339,5434014615850959851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17747387871974505339,5434014615850959851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17747387871974505339,5434014615850959851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,17747387871974505339,5434014615850959851,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17747387871974505339,5434014615850959851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:3716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17747387871974505339,5434014615850959851,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17747387871974505339,5434014615850959851,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,17747387871974505339,5434014615850959851,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5572 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,17747387871974505339,5434014615850959851,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1880 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD5f553a58524cfa336265b6dd08421607c
SHA16b8d94fff6145e66986a738c45fa09af9a0ae258
SHA256363950e88e8d812e6e6d2d7d338b03435b920e8e494221f7c003383542f97756
SHA512824ad940f7c700237388c8b7249b02fd71472b4eb9554aab66d28997005a1c1611334b53940f084e1b567ef6b55b8c953eedac584fd540a9a487b7f03b0d1427
-
Filesize
6KB
MD544eb8a9b704cb9d9fd498a34a1d980e3
SHA128983e03912c1e1e4192dd6ab4d424f80bcbb2df
SHA25651ddb970de52b46ce260234d042f90144be8cb29ed3bf559fa7642ec49b4da7c
SHA512b73c0da039ffa66e5d79e4bca2e2a4117ff6c347da733727500a4d5f79f345c49559f0de0ac377502191a9b60e7765c5ef971edfc8efaed5839018782959ddb2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d36d417edb11c36036d2ee119b7bd404
SHA1acaa3c10960f156955a9a4591c3273a27001857f
SHA25605cfe406c1114facdbf9f281e66591355a2d803e47c3dba1e6b903fb51eca30d
SHA5129b493c9ef15b51af21e9cbc0ca96756e7bdc687c107fd3c390bb8f9bd2b3a193631514f8396c2dc2359d06ed7d4d6b03737975d6fb9b3146d78e7b7f77bd0a9b