Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 10:40
Static task
static1
Behavioral task
behavioral1
Sample
d1be0a93ad920af5fb38382cde177d1d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1be0a93ad920af5fb38382cde177d1d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1be0a93ad920af5fb38382cde177d1d_JaffaCakes118.html
-
Size
138KB
-
MD5
d1be0a93ad920af5fb38382cde177d1d
-
SHA1
6e0616f36772436da0bd031fa1da9cae7b079204
-
SHA256
ea0b3f36a44061d5e866e003747a5e1692109cd1e60169efa8560a61bf0f92be
-
SHA512
3981d2edbb2d1a1a3376cd57a707114c2934c4ed57db798f5e92c7540946d601073bf8ccbfcf779e9606e5edf6b63292b5e6ff68134720ec86aaff88aeef37a2
-
SSDEEP
1536:SUhgnJqxSlIyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SUVxNyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 2144 msedge.exe 2144 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe 712 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe 2144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 3380 2144 msedge.exe 83 PID 2144 wrote to memory of 3380 2144 msedge.exe 83 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 3964 2144 msedge.exe 84 PID 2144 wrote to memory of 4536 2144 msedge.exe 85 PID 2144 wrote to memory of 4536 2144 msedge.exe 85 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86 PID 2144 wrote to memory of 4576 2144 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d1be0a93ad920af5fb38382cde177d1d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabc4646f8,0x7ffabc464708,0x7ffabc4647182⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14882693785350637415,10074039064773197968,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,14882693785350637415,10074039064773197968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,14882693785350637415,10074039064773197968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:4576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14882693785350637415,10074039064773197968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14882693785350637415,10074039064773197968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14882693785350637415,10074039064773197968,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:712
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1436
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD59c37a7d8d6a577643994d4874fb17937
SHA1968a66952c52b403ef2f17a10e3f3952adc35d9c
SHA2561b5b46e6c9ab25645f80415a82f747d4d90a0bdaf9ced9b88a8ef1a05f8c4482
SHA5124f1be8a46a03ca4c43cb80ed198ff215f1bc9d3bd8a1b715ac7cfb60bf023ac11a5e79b14ab459db18d5e077d2cd282326e5c9207c4edabbf79a4e6afb9f93f5
-
Filesize
6KB
MD52706aa5b145851fee86a48bf6f627322
SHA1673adcf342ded0ef0ad42b8466fed293d6b92eb4
SHA256c2447e98a5789a1aa98f1f3c7213fdd60e35ec6699cc5a701116338a33cdf8f8
SHA51212c9b667c2f34fe5289bf04076f4386dbe5adac249c7750e9bfd4e8c27d5d9b05d9f493b8dce1001bc7b8a72e0cda6d942fb4ec6c6df90fcb33ec476aa4abe21
-
Filesize
10KB
MD5611c667774e130203a412a26bcf22d08
SHA19b491365ad578fbd2fd988d146a3589578ef1cc0
SHA2561ca8d74bda4b13bbba3db6e94a2cd706ea7d4a8e00edde04cf5d4ce5fbd2ca7f
SHA5123a553b0ebd2b246c330aff463a1a5d2311749c3abc29dff2e8ec2fa98121f8219f90e69c7e1d7ff47ea983dcc75403c5bf8e8e31cdc734309131b110e2f5a814