Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
d217ec42046c42f2991ce8efeeada36c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d217ec42046c42f2991ce8efeeada36c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d217ec42046c42f2991ce8efeeada36c_JaffaCakes118.html
-
Size
213KB
-
MD5
d217ec42046c42f2991ce8efeeada36c
-
SHA1
c24cef013f9354c57b23055329e9293eab54a70d
-
SHA256
c54829a3b241d3939896c92c9ddb5186e7989a6852baaca2012df2b6eb5c0566
-
SHA512
8cadcc4307efbdc53c4151948758fcb53f683bb4820b4579ec66ad5a2ea413752fc1c8195bf28830ceaf1c9cb7ef49ac67369468a8cc57965ed5c16eb14befc8
-
SSDEEP
3072:SzpZpoNO8PonSyfkMY+BES09JXAnyrZalI+YQ:SzpbxXsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 4480 msedge.exe 4480 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe 4456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4480 wrote to memory of 1268 4480 msedge.exe 83 PID 4480 wrote to memory of 1268 4480 msedge.exe 83 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 4132 4480 msedge.exe 84 PID 4480 wrote to memory of 2900 4480 msedge.exe 85 PID 4480 wrote to memory of 2900 4480 msedge.exe 85 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86 PID 4480 wrote to memory of 4016 4480 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d217ec42046c42f2991ce8efeeada36c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffab4c846f8,0x7ffab4c84708,0x7ffab4c847182⤵PID:1268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1788087837737598958,1798039993906619562,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1788087837737598958,1798039993906619562,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1788087837737598958,1798039993906619562,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1788087837737598958,1798039993906619562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1788087837737598958,1798039993906619562,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1788087837737598958,1798039993906619562,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3056 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
6KB
MD55c25fa21c34a1725a10c742ca982576e
SHA15a9b3e43a0922f7250c9c989e2b75e181d64d89c
SHA25671438adc9fc451512fd8706b9f59d179096234a0d2901c3fffd494eb53797ccf
SHA51242c27fc7ee43ad4dc26e2e9fd88ca19af897b0bc2122a8967f6e1771453dee7beec8b9286f7e1eb4f3caf996aac615fb438b4e45242987a17c0ff03514159492
-
Filesize
5KB
MD5a6f3dc72606f3c12298de10ab14064d9
SHA181057330168e456d1b00847c4970e0f29285e7ec
SHA2562d5f4af1701deccfaba1e0c291e751c307df4ce4f1eae77056fc2f0704d5efb2
SHA512ab335b3c6d21e868b0e2d2254b57187abe5f5fb6e3842f84ee89c2ec2b4d30a7558ed2b1e4e40b08ca9d9d29267df69893e92bdd18582e0620f801dc26241b7e
-
Filesize
10KB
MD556221d9cc84bd0501212a9602302227d
SHA1dc56b5fc44ff60c2455a63344a9e383fc9e02475
SHA256446425ace922bec25fef0ccd598624195d79b5cdf4b9d54025ef802d7cf6a634
SHA51273f81f088f563112b557445289dcd74aac1d59efd03316b2f873d5434edc0ddd3c7c2dd218227133c3101b6a94f4bb2d8a1cbbae122f4bc907c56841e4146004