Analysis
-
max time kernel
138s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 16:55
Static task
static1
Behavioral task
behavioral1
Sample
d2688df2c90cfa5e599bca6eac3cdb7c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d2688df2c90cfa5e599bca6eac3cdb7c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d2688df2c90cfa5e599bca6eac3cdb7c_JaffaCakes118.html
-
Size
9KB
-
MD5
d2688df2c90cfa5e599bca6eac3cdb7c
-
SHA1
089015be27b36a80974dae47181d2739aef3e43f
-
SHA256
5a0fe68255b5c8217271bb3094ce2b381f8d6aaa1422885a462032e9202875a5
-
SHA512
08610613a2b0c9b784cb406b8c214e43cb0a910a068f1bfa78a0f3ea9c8a6a92bf2084588d30b5607604c91b8e4de86f41a4ee189017ad23d2cde9b75e7b08c9
-
SSDEEP
192:M123R4/Euq7EKQ213mAsvXsGcG54w3vkiUM5/CD:M16wEucQk07ag9w
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 704 msedge.exe 704 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 332 msedge.exe 1348 identity_helper.exe 1348 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe 704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 704 wrote to memory of 816 704 msedge.exe 83 PID 704 wrote to memory of 816 704 msedge.exe 83 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 4572 704 msedge.exe 84 PID 704 wrote to memory of 3488 704 msedge.exe 85 PID 704 wrote to memory of 3488 704 msedge.exe 85 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86 PID 704 wrote to memory of 1884 704 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d2688df2c90cfa5e599bca6eac3cdb7c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff073846f8,0x7fff07384708,0x7fff073847182⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3781988024744973732,959343317671489059,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,3781988024744973732,959343317671489059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,3781988024744973732,959343317671489059,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3781988024744973732,959343317671489059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3781988024744973732,959343317671489059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3781988024744973732,959343317671489059,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3781988024744973732,959343317671489059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3781988024744973732,959343317671489059,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3781988024744973732,959343317671489059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3781988024744973732,959343317671489059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3836 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3781988024744973732,959343317671489059,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4880 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3781988024744973732,959343317671489059,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4244 /prefetch:12⤵PID:4596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:512
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
6KB
MD51aac5296beaa2f4bbb5bf8ea79fd0f7e
SHA18ae61e2660cc833bf57a0ccfee6f5dc2423f46ac
SHA256646ddf5cd6dc0d6ebf3d1e37cadc749c18663d746af626b4da960e37c50262cf
SHA5124fe8a62c74d6b852635eebf0169166495475b75f34eb76b171bdb652b1fc4b56554466992877f13d0d8d822507f43c6d110ff809e2a519ebf245fb06a3557e15
-
Filesize
5KB
MD59530fd72f8aaf126283ae3c076caf094
SHA18b0314db5932b221a22b5c3e5829e613258b28f8
SHA25637831b1414fa9490ac1e79e1e424e498bf664a1181ae93859c127ea2b965b04e
SHA512184c1c2d5d61074a0a78ad5a5448fb01a213051238ddfd3fda68ba1177be1f7823ea71837f78459dd0b653f5a38c7f886b0a3f50332ba3b4c1916679d7320be9
-
Filesize
6KB
MD56bd57379f821481c36feae3532d1e534
SHA1c4ebc2e5a30fdfca36df971894dacd8107d2025b
SHA25690fcbda550d62cd14459bdf9ef60a09e106b9ee1b4227a56aeae067c395d6607
SHA512f374913b585e30ff09a78ebccdc841bdb3d0580903e579b30272334650ce6fa9cdcbef6927488823ee9843e147fe2a9bf0748af3badedbdfe65e012bdc6460da
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54dd3bd662b04731403a4729f777df8cc
SHA1e3f27354e1d3a79f356034f94b98e95b2d081203
SHA25625a34cecd2bdde2de743f9ea14f37ffd0f0dc648b8cec138613935b0d70a3acb
SHA512bdddf49258c17e15fc1014e6d03e3775b034be01f2f2f781416e57300973b75471eaaa96c211c5ca455161cd3cbf5c27a8d61bee23ea5dce5115f3bc1ff7ac22