Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 14:27
Static task
static1
Behavioral task
behavioral1
Sample
d225d6916462a41c6dd52725e3f6670a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d225d6916462a41c6dd52725e3f6670a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d225d6916462a41c6dd52725e3f6670a_JaffaCakes118.html
-
Size
179KB
-
MD5
d225d6916462a41c6dd52725e3f6670a
-
SHA1
c12b49c60a3a1b51db15b1bb18be0211607cd435
-
SHA256
8e4cc4b9ecb2e41337a078003a7498efed3e43d57e239a7c52f3ed16182e96e9
-
SHA512
e6e98ab1952c6a68e462c6ab1f86b02e35289713053e305daa6b9399896c4ad188e1f538511baa184f838b8783a362628e35bd06718b1a154a5ac4d10034d439
-
SSDEEP
3072:SoqfyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5YFis:SoqqsMYod+X3oI+Yn86/U9jFis
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4064 msedge.exe 4064 msedge.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4064 wrote to memory of 2016 4064 msedge.exe 83 PID 4064 wrote to memory of 2016 4064 msedge.exe 83 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4428 4064 msedge.exe 84 PID 4064 wrote to memory of 4824 4064 msedge.exe 85 PID 4064 wrote to memory of 4824 4064 msedge.exe 85 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86 PID 4064 wrote to memory of 4988 4064 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d225d6916462a41c6dd52725e3f6670a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff3b146f8,0x7ffff3b14708,0x7ffff3b147182⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,15281771908045635958,11412899247917280971,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,15281771908045635958,11412899247917280971,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,15281771908045635958,11412899247917280971,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15281771908045635958,11412899247917280971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,15281771908045635958,11412899247917280971,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,15281771908045635958,11412899247917280971,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD5ea0b0f335596a8b57d7920352dc88304
SHA1bcc66c5e54b7cd121843880526a80043d3c025ec
SHA2563d7d2d009827a9945e26b1a9f9169f1dd55c04c9688e20a851caa73fa6e77288
SHA5126d73f2da854a6234f5a047bb895c9db0dc570f88880eb5eefcbb56f968ed524eab0c658d20cb0be372495d15394940c185f332952633f163165de2a64c84b4de
-
Filesize
6KB
MD5413a2f6409d634742de7cd8c04b66207
SHA1d96562aee7262640a6d62ce7ccec29431f23c400
SHA256903cf444da05884816ff5c5cbe94b341f660f7dd708a47d49b941c36494b350e
SHA5121658dda591672035353e1f32634f49f483e1e9a0afa2037ac1012ecebcb0ca63ad446def445eaf1fc4b6d0a3e511db9609ffc80aee5bf7a8db30b9f1c3b43385
-
Filesize
10KB
MD552186f59e55c287fe87cee63afed1b92
SHA17ac78f61481962c829e60f3a1d8fc6c13f2cc150
SHA2568df17e2ac0a7adea7fdcc6bab650afb633e53e78c4e0b47ac0ae7a864d937e2c
SHA512ac5f6ae9e1a620b0ec79ebb268868d9abe41761c7bd8aebed13b61bac0b8a79a8b1f40381fcff5a7df146d791a34715c6ed0dec6956b7d1bb7c9deae06e87c6d