Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 09:45
Static task
static1
Behavioral task
behavioral1
Sample
d1a4f570beed4cc0f4509188950d6914_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1a4f570beed4cc0f4509188950d6914_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1a4f570beed4cc0f4509188950d6914_JaffaCakes118.html
-
Size
8KB
-
MD5
d1a4f570beed4cc0f4509188950d6914
-
SHA1
b081d25470eacd5a9b5ede7291bdf0cc7dc67bd8
-
SHA256
0a0fda4412356b5c925b92ca75ad7483b43ed4027a4cf4e1cc02b83c83fbbc9d
-
SHA512
36158ae61924f852a2b4c2e434fd5f1dbf7c1b67133521f1bded6b8b246eae7aca8308d9083b9f0e0b9ae013967324e34f9e73167116131041e32369a2bdbfbe
-
SSDEEP
192:+cMXnHgDG+Qt9lovRU8pkbaZ3+LftUoXpY5xYUUtXrKwyL24W7/Z0u:+cMfdGptZ38ftUoylUtbFyL2r1h
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 2764 msedge.exe 2764 msedge.exe 4548 identity_helper.exe 4548 identity_helper.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe 444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 3768 2764 msedge.exe 83 PID 2764 wrote to memory of 3768 2764 msedge.exe 83 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 4784 2764 msedge.exe 84 PID 2764 wrote to memory of 2556 2764 msedge.exe 85 PID 2764 wrote to memory of 2556 2764 msedge.exe 85 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86 PID 2764 wrote to memory of 2628 2764 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d1a4f570beed4cc0f4509188950d6914_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfff146f8,0x7ffcfff14708,0x7ffcfff147182⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10624508480201381967,710107739670017564,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,10624508480201381967,710107739670017564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,10624508480201381967,710107739670017564,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10624508480201381967,710107739670017564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10624508480201381967,710107739670017564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10624508480201381967,710107739670017564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,10624508480201381967,710107739670017564,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10624508480201381967,710107739670017564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10624508480201381967,710107739670017564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10624508480201381967,710107739670017564,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5528 /prefetch:12⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,10624508480201381967,710107739670017564,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,10624508480201381967,710107739670017564,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5711a721e05c5942aece75c75834d6533
SHA1ef2a7fc5f9528150ec7bea6cdddecb625c5d74ff
SHA25667dc4b9822f27dee61cd31f6ac7e3e495fcdc26b0b7b688e02f4cc8a371cfa42
SHA512950cb70b021d5fad63cb9ce1f5dfb80d59bc3e350896f99a7ef075e183a5082bdf0f867a17e12b6e7eb4f1228f71967bad073a1f2ca172ae2d23096fc8ae6693
-
Filesize
6KB
MD5875d06ed898f3992fa7c3bbd8df15d65
SHA155e84603052353d83afa150332e7e4e6d22b7679
SHA256868864df8900f25e8f39d5ae318bf7f6a8da1b9b27018873c0c73fcb5172a65f
SHA51223d4e4af94441d8b822a3eff5631d6f4f0b8cce87a7f8f3e59234a0a9ecb5c5f7e95e396b193ad797a3c5174cad3cc1608278261df4690dd220da728fcff4b24
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58d3b679435cee24b162e3db23ca99773
SHA1c053f52e1be2f62cf8d708ad2cbbbbfb1dd2ac9a
SHA256e68eb7d822c3a665914d42ea9a76434168eb620bf95a89908a89767b5945a90d
SHA512617c34ec3b2c63f9c27aecd9efee0014a7a257fe26c3c8743048815dae685b893c91c3458e74c9bee6fd88ecd7a08b2481d4a5df22b1d6d8b5162eaf5abbfe5f