Analysis
-
max time kernel
145s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 16:43
Static task
static1
Behavioral task
behavioral1
Sample
d2628e210129bfcaff4a175fe2840070_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2628e210129bfcaff4a175fe2840070_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2628e210129bfcaff4a175fe2840070_JaffaCakes118.html
-
Size
223KB
-
MD5
d2628e210129bfcaff4a175fe2840070
-
SHA1
747805918c852f6315cd3311b98515a1f8e7f5ea
-
SHA256
59c4f3fa717ea4d7607fb746aae6ab6738d5ecf7a804fd7bf8cec0a067517c17
-
SHA512
b99cdf0b5b1408a1f69d8c9774b0fef08b274663d1029d67833d75a0ed51d8a2ecb7a4a1ae92e1d59d34f103250c15f83bbb20b1d4f7525dd9f055051c0e9f5f
-
SSDEEP
3072:S++LQXsqsKrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJm:SGz9VxLY7iAVLTBQJlm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4176 msedge.exe 4176 msedge.exe 2252 msedge.exe 2252 msedge.exe 4436 identity_helper.exe 4436 identity_helper.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe 2252 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2252 wrote to memory of 3236 2252 msedge.exe 83 PID 2252 wrote to memory of 3236 2252 msedge.exe 83 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 3992 2252 msedge.exe 85 PID 2252 wrote to memory of 4176 2252 msedge.exe 86 PID 2252 wrote to memory of 4176 2252 msedge.exe 86 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87 PID 2252 wrote to memory of 3136 2252 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d2628e210129bfcaff4a175fe2840070_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfff146f8,0x7ffcfff14708,0x7ffcfff147182⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14469715394400821196,10127019477589622718,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,14469715394400821196,10127019477589622718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,14469715394400821196,10127019477589622718,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14469715394400821196,10127019477589622718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14469715394400821196,10127019477589622718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14469715394400821196,10127019477589622718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5384 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14469715394400821196,10127019477589622718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5404 /prefetch:12⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14469715394400821196,10127019477589622718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,14469715394400821196,10127019477589622718,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5292 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14469715394400821196,10127019477589622718,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2180 /prefetch:12⤵PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14469715394400821196,10127019477589622718,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14469715394400821196,10127019477589622718,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4512 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5204ebd736a20727097c8f4f5da6bd496
SHA1b49cab62c2a4507ee73de79c5c02a38e6d62cdf9
SHA25626826bd467ce5d8b05ef5ccf8d081f228d3341e744d50e29d591bc66a8441400
SHA5124f571d6936b3cb1ff360d66f0556c786f33774fcc55ab3e98f7c39f4d102a9d7ae7afe432aa577e8aa8d6c49499803e4ecccc5628923b100b72568131d47a8d2
-
Filesize
6KB
MD5881e88180887f7833bd3984ade0f0085
SHA17b43391d25e4b33ee5429d21ec9768a4efc6ac9d
SHA256f5c306f77aa3461c9642afd85e1d80ca723fdc55e02b6a95af0920a29e0f55c1
SHA5124d148d83d573cc243f649086a080f83d60ed10ab380a8b8651e8d98a70c304b7f70fd6bd5b28d79e1729c5532c7fd84975d81d7bcb5a37890239fe0a4765bf49
-
Filesize
6KB
MD5de96f1107a25d6b1f89d5487a1d127f0
SHA1ed956912438e5ac82a1bdc61fbdc38389f010d63
SHA25631bd1a9a40f650b30d54ffb452b86a69b1d72fd89c8e9922c076ce1a04cb75ab
SHA512bf0d0ab2f03e3d0b8b637d7a057a91985e7bf028c624f8de422ffe6c413cb850becd7cb54ddeb835ca9957b7f2572695b9c62701be664d228e777d7ae19755c4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57d5a57b8878d6ae67136fe286bc9291a
SHA18e716e75f2d8e718a5f17d6516444fcf3b88a299
SHA2560e7f7997ab7786d8ab1b14f79abfea1b3cb2bc989984f309497a745f66679ec4
SHA51226e070f643b31fa24ce89366692c9e89cb635367d875b9e62d97dbcb95dd86d34153211f1d05a7ae25521d8d3999257d8913a01f150c2219ae1d3a9bd159fe8e