Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
d5282fabf47f0bd0a64f297ab2f3bee2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d5282fabf47f0bd0a64f297ab2f3bee2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5282fabf47f0bd0a64f297ab2f3bee2_JaffaCakes118.html
-
Size
37KB
-
MD5
d5282fabf47f0bd0a64f297ab2f3bee2
-
SHA1
b79dc1d6fa1871244f0e2b9612fffea128f77a46
-
SHA256
820d3941c96d39d345452f7304f331c6b91762610786d793df999e32476640a1
-
SHA512
69c270f7da20e8914400549430a0f83736d4627c6c2859d674ced1004660bae521a03d0023cdbdf81e9e7cdccff54c3c09d4fac8cea057b38a20b2f21751309c
-
SSDEEP
768:4fRkts3MEVyKAJ4Lskcq7AD2oZNq/EA5AL0zdl0k4k0kRk7cWrQBAy:4fKG3jwxJ4jj7AD28NcEApjfK7cWr6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2196 msedge.exe 2196 msedge.exe 4924 msedge.exe 4924 msedge.exe 4624 identity_helper.exe 4624 identity_helper.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe 2608 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe 4924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4924 wrote to memory of 4620 4924 msedge.exe 83 PID 4924 wrote to memory of 4620 4924 msedge.exe 83 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 5028 4924 msedge.exe 84 PID 4924 wrote to memory of 2196 4924 msedge.exe 85 PID 4924 wrote to memory of 2196 4924 msedge.exe 85 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86 PID 4924 wrote to memory of 3320 4924 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5282fabf47f0bd0a64f297ab2f3bee2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff449b46f8,0x7fff449b4708,0x7fff449b47182⤵PID:4620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,8846184412836768062,14179509033635345962,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,8846184412836768062,14179509033635345962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,8846184412836768062,14179509033635345962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2120 /prefetch:82⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,8846184412836768062,14179509033635345962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,8846184412836768062,14179509033635345962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,8846184412836768062,14179509033635345962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2028,8846184412836768062,14179509033635345962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5216 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,8846184412836768062,14179509033635345962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4928 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,8846184412836768062,14179509033635345962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:2488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,8846184412836768062,14179509033635345962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3988 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,8846184412836768062,14179509033635345962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,8846184412836768062,14179509033635345962,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4828 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2608
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
391B
MD5d8197a607fc92a9bdd3743345dfabaab
SHA1716a30c259dd82fbe87b31fa3b3ec4711088d31d
SHA256147893ff2b0dffac6b61b406fd10e77fd431c0219438142fb33fc8a0a994bf89
SHA51276c082daeddb5c2c7462e9ec0dcd886b85e10bf0f3ff26b1746fee98cb951d2478e43a8ab3ee32365af3db4e5496d0aa6baff6aa91dbda8737cc36e6ddf8260c
-
Filesize
5KB
MD5ba086d5a0bba56a25758fbf9a8f46a59
SHA15d12e4b7fa2a0b197522f2022fac9524fccdf172
SHA256d7d61bc1f111687ee6311de69178883015f4107514217907269ff457273ec069
SHA512037a114efd81345b285eae980a04065d1d2d997109e8781400080c93651e1349fa66b490ea57c3d3f410201e1ffc8af485a5a9156dea66fd1ba436cad81b664e
-
Filesize
6KB
MD5e48c551303999230a89bbe4f76eda4cf
SHA153cdb969f23842f7a2bea4e5c1c9973d09f326d9
SHA256cc42def0fa12d52d9641cd789e8fe3af26dbde78932f09320d7fce84c5b2f83c
SHA512e3e2e65adf3f73c229f96c932fc5627d216abf9ba11d685d6ae2952739c156f8fb5b649e5cdd0276b49d65ba3d2a6fafdfc50668523360373042eac91049a1a9
-
Filesize
6KB
MD548fc0a23def304462f7e2bfe4358ccbe
SHA104d9da6079dedbd6887b38e3c00cc3d09ded5b0e
SHA256216458c240312d7def5f0968336c7fcda395a322b98315120898cde91f95a66f
SHA5129cb944e9f37afd765be1c5fa960983f1facd189e55de6f14479888ec93ceb64770371b578bdac4e7694ced8aa8872022b892c2f4de5573e74c7304b175f12d95
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52f8e09e42891b49418246bc9854e7791
SHA1ed1854edd2adb7563715da494a94e786f61d2397
SHA25655ddf96f1b472e66d18787caa83989bc0af72d340b275f0d208b5c7027f663fc
SHA512d0a56498e858feb6ce5316e7a2b53f4e21cf8840325e19ba85688f0a21a7e42b6adbf4714d3cedfb19acf59716138b96c124f4aecbd004f0b149ec3ab3e8165a