Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
d297c89063ad067a03d2b618dae77fc4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d297c89063ad067a03d2b618dae77fc4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d297c89063ad067a03d2b618dae77fc4_JaffaCakes118.html
-
Size
29KB
-
MD5
d297c89063ad067a03d2b618dae77fc4
-
SHA1
028766e6a43dcab343762c7fbcabd7e6415c40e7
-
SHA256
debc16edb81cf8fbff2f0b0f7830f7019136046b029593f1f2b33487e5caa45c
-
SHA512
e7316e84b36d4457ebfb13a6728b30c1a2330242f70cd3e4f32831f4b655ebce6868f196026918f32cfa2954dc0d01cd1ad03644565bc0cfc643e2fb64a02758
-
SSDEEP
768:koiFFviiCkrtyUeledbe2emeresexeXepeYene7CM2eVqUrLrYVOm8QACkGO4MCX:kVFJtteleZe2emeresexeXepeYeneV2T
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 744 msedge.exe 744 msedge.exe 1028 identity_helper.exe 1028 identity_helper.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe 4500 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe 744 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 744 wrote to memory of 388 744 msedge.exe 83 PID 744 wrote to memory of 388 744 msedge.exe 83 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 1432 744 msedge.exe 84 PID 744 wrote to memory of 4708 744 msedge.exe 85 PID 744 wrote to memory of 4708 744 msedge.exe 85 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86 PID 744 wrote to memory of 4940 744 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d297c89063ad067a03d2b618dae77fc4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9779046f8,0x7ff977904708,0x7ff9779047182⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14771100637845177898,18064222876883528382,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,14771100637845177898,18064222876883528382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,14771100637845177898,18064222876883528382,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2528 /prefetch:82⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14771100637845177898,18064222876883528382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14771100637845177898,18064222876883528382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14771100637845177898,18064222876883528382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,14771100637845177898,18064222876883528382,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4940 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14771100637845177898,18064222876883528382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14771100637845177898,18064222876883528382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14771100637845177898,18064222876883528382,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,14771100637845177898,18064222876883528382,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5580 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,14771100637845177898,18064222876883528382,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3036 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4500
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
592B
MD58160876ebda81f31b503a2296ad69f28
SHA166f03c333f70f449c76f543413a60a18e7161542
SHA2565dd2531570c36d57465b83820478f6a5982db63ecb9a5fd793f1deaab06d1d0b
SHA5129607fa95c114b61a7f9542bddaf3a294a8d09a7f9a164bdedb2a9f068a0fa1cf2f6f772ef7f6dbe386b8844470660655dd4e6bbac5400f61963dba9dbd7e10e6
-
Filesize
5KB
MD5294eac3ea7819bb7545bf66b47a82901
SHA14f96a488fd7d17b870cc49f102141cfe28d178ad
SHA256b8dc8196d0ccf839492152f18bb51873da097c09b798965a96e2b53dd2efd638
SHA512d5c69e1f037cb3a1664e48acc8c90a8bca64f63cec896866ac85750673a9bf4fc7fb4c2cfbd146682e74793b0e0ee6bc7b991c62cecb3235e0650bbaebdc39a7
-
Filesize
6KB
MD5b3a22c6f0445c4b8ce310c1ec739f726
SHA1a140f0056a00828007ed213619d03e22317586cf
SHA2560425065a6cb53594605864f4e4a1df058374190e311d0729b14179bbc9564da9
SHA5124b112e6243557e2e70bd6b02a11824314a3c8ded472e399a3cfe41d5d30d8ac1983b4ca31b114d157559755b0ec152d49deaa1431cb98b7f8c17c48f5c050bdf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD513d2893ced0adb4a229ea6535ff9f755
SHA137cc5c3aab0bff7ce0c3359fa92ef9fe2f3b0f7d
SHA2567fdc153b88a25188371cd7f772951ceeca5a04f7e3baf8f6686e9fb29c8bfd4e
SHA512cdb6894438982959de7fbcb806274ed61d55b51676daede2bfa8b1a8c6082166fe2a3d382dd45c70677a34d831225c697e266931e6c247bff97ce9f82537d455