Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 11:55
Static task
static1
Behavioral task
behavioral1
Sample
d1e00748036dc6eb034b58b78a5b200e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1e00748036dc6eb034b58b78a5b200e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d1e00748036dc6eb034b58b78a5b200e_JaffaCakes118.html
-
Size
906KB
-
MD5
d1e00748036dc6eb034b58b78a5b200e
-
SHA1
db5fffb4df5ecb7784a7610e82172b458c174f1c
-
SHA256
779c06d2a58fee2d784712687a3ada61d8de845e950c1fe586eceb1394a5c598
-
SHA512
6663478b164a419039223fc15400df87e7232aec91ee2a5ba231977e786de1ce8f2abfc10514a5d60f22cee344970801388ff5e79fca0908cf231df153708bb6
-
SSDEEP
3072:7pmRf2szA0N/Gd7ZXljgrJtdYyVeef0xOMQfw/df2szA0N/Gd7ZXljgrJtdYyVe7:7sM+tdYyYQM0sM+tdYyYQMpl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 4172 msedge.exe 4172 msedge.exe 5036 identity_helper.exe 5036 identity_helper.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe 1388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe 4172 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4172 wrote to memory of 3576 4172 msedge.exe 84 PID 4172 wrote to memory of 3576 4172 msedge.exe 84 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 4660 4172 msedge.exe 85 PID 4172 wrote to memory of 1832 4172 msedge.exe 86 PID 4172 wrote to memory of 1832 4172 msedge.exe 86 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87 PID 4172 wrote to memory of 2780 4172 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d1e00748036dc6eb034b58b78a5b200e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff90de746f8,0x7ff90de74708,0x7ff90de747182⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14141985214870990892,5763726775430390446,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14141985214870990892,5763726775430390446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14141985214870990892,5763726775430390446,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14141985214870990892,5763726775430390446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14141985214870990892,5763726775430390446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14141985214870990892,5763726775430390446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14141985214870990892,5763726775430390446,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14141985214870990892,5763726775430390446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14141985214870990892,5763726775430390446,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14141985214870990892,5763726775430390446,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3560 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14141985214870990892,5763726775430390446,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2324 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14141985214870990892,5763726775430390446,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
675B
MD5fbe7a28f74280f74c8e6453010b4d9d7
SHA140d2905a054e38a49a24b7ce9cdbc2ed9364b50f
SHA256abf0ecfc72163eb120fcae0fc114a3230b2892b4922693dd2a309137e6da0a56
SHA5124bbc7e2b0f522c59fb823f38a1134903674f604a7ee71675108e4fda08ed07752468835a8e993d0470cfd34c638b958e80c403e05bd828f0c56910e62ced9dc3
-
Filesize
5KB
MD5c4650003bcd4210c6ecdc07a1f5c897b
SHA1d0d04dd931182ae80e262e5c55eb8d7bba7f6543
SHA256bcfc268536c9c270d111a867fa5497b3ef2121c1e90da053ac53884ca4239a1f
SHA512dc6abe90ef280215f3a6bcf55ae337dc05d9872bf8b399d248248be2eb5529d195576ce56df8464105063002699983c431e9141a3869721b3cdcd92a42cc8956
-
Filesize
6KB
MD55545a0ed779a223b528317583a2cc5de
SHA15386a19b61143974750a86096ba098a359f0b4bd
SHA256dd9c8318cbbf3971f4d83f208ef5a7996632008e984a8efc1cfbf96bfb943cff
SHA51238346f1dba364eb5dc35c81f019b0a60c50eea84411c36ca3269938904af5552d29aa0f1bd325ad2c359fde8fb9eaa6af85964106d37e2cf5670bb65357e33c2
-
Filesize
6KB
MD594f73cbbd0fa6e51a3c92323875c2f52
SHA1efadb8b56d054617cde55335b179a85690145a1e
SHA256cd222fee1dd3fdda34f61d8ceeebd55c8051eb5dd47c84bc0416bc0cb877dace
SHA512ad2ae13eef404ec1b10ca219a5b59928be3648c704a75aa31514337761b2cc06ddaef00166a626bc2d8b404a1b438ca14d90b76cb1ba87ac4cebd0b02e1e0c48
-
Filesize
371B
MD5d40325c3d4f009b6da2011fa2b5981fa
SHA100991fcc6b972aabe5f3a089a4a9cf80936f0ba7
SHA256fc6e449aea1462238ea04e0457037dc3438e10ad83bb947a70dcdfb0ab916a91
SHA512ffc6971d9e9bc89ffbfd061e05f75df7729e021e299c12cc8a7ff23077a0a122fd9e4aecc1712d9edddbd1ebc16294e6ef53c81d79e87a871a4fdd368c321fee
-
Filesize
204B
MD50fb6712db965fcf364e24d6a0155ae5f
SHA10c40dc1b5af2d055d7c094a39b0e3215552e027c
SHA256e85973252aeca3e07bf65cbcff647b87102aa438bfbfa71be1631890f7465229
SHA512b5df2fc8104b1e90be3bd1ec2c9ba5d5532a1a2598d03e1389f58bbb7029e9878ee987974ba4cec49948348edaaf9cbcdb46fdca8a6cc660b2e3df35567032f0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD552b7cc3484896fe34ba092bf2ce3ffdd
SHA1c6f3141e0df9f56751e6f1e2af04e0920b740ef3
SHA256614a2858c41bb89d99f5c9bccad69334c90985cfdfb25f35499c889d4890cc0c
SHA5122e9cf28f3d1bbb46b91f1aabd07258f802b0019508a2f97caae26639c5af54049f6ecd72b3867662648e78e3767d51f9ad5cd5c9837670f264a5a952afc83bde