Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 18:24
Static task
static1
Behavioral task
behavioral1
Sample
d291d1d06228733c79e2da58aafd2489_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d291d1d06228733c79e2da58aafd2489_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d291d1d06228733c79e2da58aafd2489_JaffaCakes118.html
-
Size
19KB
-
MD5
d291d1d06228733c79e2da58aafd2489
-
SHA1
b720e130c551190c26cb4ac634f397d9ce1217c3
-
SHA256
65cc6d18f37f61de28fc73a71837432e213ff8f5ee1cf89c4a4011501c705d5a
-
SHA512
09e021ef0ea211505f21b03c17886515c50e0f7cee1278709dccf977a7ad40163fcd36bff39751e02e5a2ef27b293adddf8e9cbe732b1593ec24a2251bbd880a
-
SSDEEP
192:9K/ypUhTSYiqEWrULTgE9d31o5CLU5z/qCrMQ1QnjQZYgEh/OoCShEovV/qCjMlP:4/yoTDi7LXfcoQhcpp55ibi+iC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2356 msedge.exe 2356 msedge.exe 632 msedge.exe 632 msedge.exe 4540 identity_helper.exe 4540 identity_helper.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe 3468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe 632 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 632 wrote to memory of 1128 632 msedge.exe 83 PID 632 wrote to memory of 1128 632 msedge.exe 83 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 116 632 msedge.exe 84 PID 632 wrote to memory of 2356 632 msedge.exe 85 PID 632 wrote to memory of 2356 632 msedge.exe 85 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86 PID 632 wrote to memory of 872 632 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d291d1d06228733c79e2da58aafd2489_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9779046f8,0x7ff977904708,0x7ff9779047182⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5560 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5200 /prefetch:12⤵PID:4896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5820 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5912 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,3699258117222751257,1487935801668566066,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:680
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
1KB
MD57ee40342965336588bc22555dd0ba643
SHA1ecbf76445153364393577559b616c2634d41a497
SHA256fcd792d20cededd72364da3f10a876b55f110585e06c44495af246f882bce115
SHA5129cb1f22eef1d7ff30d1a5f0671b491b70f29976f661eee3605840b6e21e08ce898f36c2098da490df81e5b5f25053e44ebf8b768091bffb256964d1d862818a9
-
Filesize
6KB
MD57dd0d573b1a98251023c3cc1203fcf3a
SHA186602f5524daf2da0427e1c12e855e8fa825abf3
SHA256f3b63fa3825a21eb40b1187bce79bcd2c342a8465bfea079fe0adf7e50cd0171
SHA5128169ba42a4b3c19e12dccc0fcf324ee3a34be497ddf6824b881e179d56a8f0291435594a490da5601eaef717099079a9c32658456208887290e4fc88ae201a08
-
Filesize
5KB
MD520da9596c8413d533fe401eb9894deae
SHA1b6dbfd4be877ec36c706e45c211f555946dbaeaf
SHA2560f452bfbb7dc43c34d9bebe9220aceb2b8f76567c19fa00041838fcea7b43124
SHA5128e32cdc81c939baac4cb9913ff2cefb5ecf51177131bb061926ea2fac76d83f0abf54babbfa808df8664a8c745478e6261f1fa9f4bd0fb7fa0fce0f8f5727fb7
-
Filesize
6KB
MD57d870a177fef5c9cef74f32606505b8e
SHA1b72bfcccedb481f70722d14934bc76b4f1e48d8d
SHA2563bb3b7ab99679f56ad0ac77b58b455a595c3931829e48650fc61c7835287fa1a
SHA51262a4b41de6b0d0a72015782436922bb6144f0bb5137cffd28d582c2b6ab952b0c7d9b7e042db85e23a05f336c77081cc74c16c1571e505c42fc76b2b9f14092f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD584b5f3aac475b12fefcd07689ff2d198
SHA10ed21bbeea8063cd213e56453206d656acb08f1b
SHA256786ef9c3f7c0eda1eeeec3e0a4036935719e9cbec252f3a22595364236bf5a6e
SHA512112c3ee4e8523887d5d712b83c40cc765230a3436c21f295cbeb60b5d304107708ebf04918c96242f08936b0e19eee295b485891f54e91b6639ec623b98c391c