Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
d262fa98e2b0760ec571b0de8574065c_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d262fa98e2b0760ec571b0de8574065c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d262fa98e2b0760ec571b0de8574065c_JaffaCakes118.html
-
Size
271KB
-
MD5
d262fa98e2b0760ec571b0de8574065c
-
SHA1
8fd36edd35393f5f26599f9c8e4d2ad9b24d8ed8
-
SHA256
363234f817b53f0e80213ad553d795f89017dd400c9740f148c2844d18345b58
-
SHA512
b96da736e3c6a33480ebe3a156ff771de55d9e0d73e509ab907bdb0a7c577034c2b0ffbbafe5b1b9175fbead519c9c4c64aa48b824e4a76ce4c5dddeef0dff7a
-
SSDEEP
3072:i2LyZ5PZJNriyNY3n06mrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJz:JyNY3n0Hz9VxLY7iAVLTBQJlz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4504 msedge.exe 4504 msedge.exe 1168 msedge.exe 1168 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe 3760 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe 1168 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1168 wrote to memory of 1668 1168 msedge.exe 85 PID 1168 wrote to memory of 1668 1168 msedge.exe 85 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 3148 1168 msedge.exe 86 PID 1168 wrote to memory of 4504 1168 msedge.exe 87 PID 1168 wrote to memory of 4504 1168 msedge.exe 87 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88 PID 1168 wrote to memory of 2700 1168 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d262fa98e2b0760ec571b0de8574065c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc5946f8,0x7ffcfc594708,0x7ffcfc5947182⤵PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8603135285045902894,10732055823672860826,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,8603135285045902894,10732055823672860826,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,8603135285045902894,10732055823672860826,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8603135285045902894,10732055823672860826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8603135285045902894,10732055823672860826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8603135285045902894,10732055823672860826,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8603135285045902894,10732055823672860826,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1732
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
552B
MD5bc3df3e50adb5b13e113423c7f2ef202
SHA19e3b3543c84273efeaf587650a6575ad4072a028
SHA256926d8ec343c8d94584b312fd90dace4576235bf4c72d2ce01a2ae2e3fbe2c847
SHA512d55011b2401c8972ad7ec4c258e5544f2b0e325f246511bee82ec0c2f35a8dbdcb22b75354ef35e5e193f9d63659014e6ebe1183654d5c0bd896772b97db7bb4
-
Filesize
6KB
MD553d78f80413f902eb94276039197b153
SHA10734189a84d968d4e673447cef2063574fc2429d
SHA256e4d4b4a154e3d671d0a756304cc663605ca7f5533b3383604977247c67c4c7eb
SHA5127abd9df980833f4e7acc4fe5125b4a30b102ed7be74ab99487e85966c4a8c0f1d313af259cf4770cddf13c55e33af9c75b666d605b995bc112c4a9d222d2a6c0
-
Filesize
6KB
MD5c318bb793083470926afc1eab76091ec
SHA181bc905d0c353195a81e6434950771919b93f259
SHA2569ee708a0cddc7c3d766ba54d56cb4c02048cf2908cebd4f0696dd94fce81f25f
SHA5128347a3bfb181209a6608b96cfb0415281bb3e6b0eb99815b05446c72603a5e1c732f5caa595387892d333241bb067bd1e62e33c00065eca41c4d6a7dcc139b93
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c15d9575-62ea-400d-ad50-21b796f63dc4.tmp
Filesize6KB
MD5e0a0e01ac4f59e4a610928879288dd8b
SHA1d3c1e6c255c0944bf61436ace95e172ba9b11661
SHA25622e146b555260e113f13a211413af13880e9d0b80fcb92ac2b77f2253ed41f09
SHA51287879dd1cb3b6571c192ef3de1f2215ce1225ecc183785bd9712109a18ec4f0fd6cdcb5f8c3ab99b35fc0aeb4c5af1e34f1a91e73364209d0a6fa584932c2536
-
Filesize
10KB
MD5201b446ee5c48785cc70a4cbac21ba0f
SHA1c042cc14f8ed925b2476ffa856c25e03f775984e
SHA256d340ece0ddabbb8edfc073a66167926fe3ead7593403669b3761c7e115dff0d4
SHA512ab0eafe4f5012c5f2838c475bf8cd0e83d5f85fe046ab016f92310e1c722d9eaad2f3ce83352e27755a20df93aa6421ba9543cd6c4c3796f84681d61ed33a421