Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 14:18
Static task
static1
Behavioral task
behavioral1
Sample
d221b8177114187650ce6bc4c687a311_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d221b8177114187650ce6bc4c687a311_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d221b8177114187650ce6bc4c687a311_JaffaCakes118.html
-
Size
71KB
-
MD5
d221b8177114187650ce6bc4c687a311
-
SHA1
96db7e2894d9e953698ea3589f321f17ef81f50f
-
SHA256
2f53fe72f1ab552ba6d85bf962bdd3c9f9b7a2cbad9e68a76f8213d7f172168a
-
SHA512
7c9f22d25d82b37101c5dfe29dc6a0d293718f689c8c6235291d101e131bbd6f01da8861af358d6195a1f0d8de76043302062834db020fa87bb6c41d275f9292
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcgs5HA2tyLQkSJcZXeisqp:s0bkL6C
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1476 msedge.exe 1476 msedge.exe 4424 msedge.exe 4424 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe 3576 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4124 4424 msedge.exe 83 PID 4424 wrote to memory of 4124 4424 msedge.exe 83 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 2640 4424 msedge.exe 84 PID 4424 wrote to memory of 1476 4424 msedge.exe 85 PID 4424 wrote to memory of 1476 4424 msedge.exe 85 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86 PID 4424 wrote to memory of 4988 4424 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d221b8177114187650ce6bc4c687a311_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa23db46f8,0x7ffa23db4708,0x7ffa23db47182⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,5740091503985767224,8261017770966276526,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,5740091503985767224,8261017770966276526,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,5740091503985767224,8261017770966276526,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5740091503985767224,8261017770966276526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,5740091503985767224,8261017770966276526,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,5740091503985767224,8261017770966276526,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3576
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6d8ac48c-e203-4fb1-bd5e-b0aa87d81ac4.tmp
Filesize5KB
MD55dd1e84adba0d4cc823cd2b6e51239c4
SHA1f37fe2bd799a6686bacf6f476f7e8374b65aaf37
SHA256a235c0822dedc28e0766f44bf110d1b2de23c1a45bfe3895a7dc894325b30724
SHA51281f13ff04567622677ec8898fe76de71fc3222923e7b2b71798408dfd9065d6b18582d508544470e51cb84eec33f6ae0002ea44437b0daa6231fc07de646d929
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5220589dec3c25a5eb7c90067bd36c6c2
SHA1e608bbf2ea38bcf89a4d5db4036e441c04e214b9
SHA2566b695c33ef0e610e021f88499fb95ed64cd3ff300ef0c8b6594fc42167b72720
SHA512c2fa8bba004e09d8e9bada145539e28da3c76a69ecf8f2dd698b927aa0013c6920a0fc3d1ff6b70a01b2bd1e2cef3ccf588651adfed627674496501fc7b77eaf
-
Filesize
10KB
MD5af8d44a077d75433a31e72d9560e0785
SHA136657bc540001593a5f0394203e97f10c9ba0de3
SHA25676deb1fc016ac8452703ffd102cdd7b2f33f09a7719233662ae9c5450b77e150
SHA512c8598e40d52decf8f51a12bcbffa8cf20db63cc3025a19591d725165c54db3c9fb29b803c9e273d4162a7a3f660a1f0fdd8ba65c5fb1d865b41f87e374ffa0fe