Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
d1a78bffbbec419aca172ddbb48272d7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1a78bffbbec419aca172ddbb48272d7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1a78bffbbec419aca172ddbb48272d7_JaffaCakes118.html
-
Size
142KB
-
MD5
d1a78bffbbec419aca172ddbb48272d7
-
SHA1
87ce78aaee0ad6be7198d7fb0a1a05d730ac5ebd
-
SHA256
2434db797e4d31d10072bfb337d6f7c0a871146398186d74b4f072e6053ab10f
-
SHA512
444dd633d4d2806b176fa48334d70f27a92bec8678cdb2d77b0292b7bcff182093969e6fb8369ac12da00183b6bf038b375132b0a6f2ad8ee04993a7d1778ac8
-
SSDEEP
1536:Sh3MSfVXslzq3JmyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SdVuqYyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 2068 msedge.exe 2068 msedge.exe 2332 identity_helper.exe 2332 identity_helper.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe 2068 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1408 2068 msedge.exe 83 PID 2068 wrote to memory of 1408 2068 msedge.exe 83 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3284 2068 msedge.exe 84 PID 2068 wrote to memory of 3916 2068 msedge.exe 85 PID 2068 wrote to memory of 3916 2068 msedge.exe 85 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86 PID 2068 wrote to memory of 3400 2068 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d1a78bffbbec419aca172ddbb48272d7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff82e9a46f8,0x7ff82e9a4708,0x7ff82e9a47182⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13155310318028043868,6900286663887641386,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,13155310318028043868,6900286663887641386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,13155310318028043868,6900286663887641386,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13155310318028043868,6900286663887641386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13155310318028043868,6900286663887641386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13155310318028043868,6900286663887641386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:82⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13155310318028043868,6900286663887641386,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5452 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13155310318028043868,6900286663887641386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13155310318028043868,6900286663887641386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13155310318028043868,6900286663887641386,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13155310318028043868,6900286663887641386,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:1340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13155310318028043868,6900286663887641386,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4812
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5c18c0e0ab566d54342347cb7d9687f41
SHA17ee51ec0cfbfe5b088abb1c0e061594c56fbabb7
SHA2560f81b9236f387e9de57f4cab35f26e07a5d0adbabcd5a25ff8451b5a5c455528
SHA512bd04ba4008cf4f59dfd6f0b52010e8b7d72ea373b48d2758df73a93442b9ca20f146b23344c7f51edb1b7a653f531113a9dc9a0d8038bda5dc25ff4634ccbcba
-
Filesize
6KB
MD5063c8c5fd2f5a408f1ad0f8b69defda1
SHA1e534748a6f8bc6b32447f05b54d6a7a9f65567a7
SHA256f7ac08b30e353a3eba4872ac748f37c82fc602ca8b8dd2efa7d04f6ce5a65d23
SHA5122e089eb1e9907ec4c1db9e3cc4df4dd6df7d0c4b63743c38eb2856a440b3a040aef1f95a5b8641ab1eb61cbfaff9c340b84b0a186ae175f25b758f0d4d59f4a0
-
Filesize
6KB
MD5732254c18bceea4e9f662464cd7c95f9
SHA16eb466cb3b22676f549c029466a555e118b633fe
SHA256b908ae97db445f36e1c909628621d2a77f67901ca7560fff7b59261eb04776bf
SHA51282f3ff03b0e8c8f1942a09d6acbc1cbc0d2ef2c3cd26b47c88a091191509324cae097969c23e1203563c6e37ead5fe5991598f8d71cb741edd18966a6406e18b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54d1f7bc14d208ad6f2a265598cd0385d
SHA1fec0867729c899457c99451f5dca6b4bde02d9a6
SHA25698d8f7c7465104515aaca1d74602c8ec40e1856167d541144d89c1799db6c694
SHA512c87bebea2532dba7928fed14d74d3f39a279380c9cd989aa277991259ec4e9eb571513041229516c0803d0ddc593e7d39f21067f22c7971be78b1ce3b3b9625e