Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
d5314381d8902b054150d16198cda574_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5314381d8902b054150d16198cda574_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5314381d8902b054150d16198cda574_JaffaCakes118.html
-
Size
4KB
-
MD5
d5314381d8902b054150d16198cda574
-
SHA1
59f247e7de301b9b8cc42c91c54cd257241cfd91
-
SHA256
0dc1fa0fee06fe32a0b23a236bea04b2b1b14ba9b517f3979bd0792b51cd61f9
-
SHA512
eb8997d87952997caeb1ac95986feb0ba20d9e96cbda6e91a75c23db0e17101d14cffc911788fc99627922d0818c55629ef823b25c65e2210754170b3f5d5d6e
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oFu6d:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1308 msedge.exe 1308 msedge.exe 4208 msedge.exe 4208 msedge.exe 1224 identity_helper.exe 1224 identity_helper.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe 4208 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4208 wrote to memory of 2992 4208 msedge.exe 83 PID 4208 wrote to memory of 2992 4208 msedge.exe 83 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 2808 4208 msedge.exe 84 PID 4208 wrote to memory of 1308 4208 msedge.exe 85 PID 4208 wrote to memory of 1308 4208 msedge.exe 85 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86 PID 4208 wrote to memory of 4904 4208 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5314381d8902b054150d16198cda574_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee2f446f8,0x7ffee2f44708,0x7ffee2f447182⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10503693551900111769,13396299613415254550,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2056 /prefetch:22⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,10503693551900111769,13396299613415254550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,10503693551900111769,13396299613415254550,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10503693551900111769,13396299613415254550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10503693551900111769,13396299613415254550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,10503693551900111769,13396299613415254550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵PID:1012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2044,10503693551900111769,13396299613415254550,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5252 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10503693551900111769,13396299613415254550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10503693551900111769,13396299613415254550,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5320 /prefetch:12⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10503693551900111769,13396299613415254550,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2044,10503693551900111769,13396299613415254550,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,10503693551900111769,13396299613415254550,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3136 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
292B
MD5b14c101bf5ed1b9c901d81be38268a84
SHA1456282d9e3334efd37b1b2724df9b1da2b39cf90
SHA256328702339217f3c535cafa962bc0b28f676c52f3284cc4791aa0eb1df5b71f38
SHA5122ca757d85d106ed83e2db0b7a762fc147a16ef8a213829dcd81187cf4c8ed9ab8ffab0b8c0176805d3bdbe8a3fc06dfd5d74957ccb0386a987f0a74830c624c5
-
Filesize
5KB
MD5a61f9582a968a39d39e0d067a6d15e93
SHA1a3f063c160e02accc5250563604a0753293fdf51
SHA256782a82adbc7d2d129d9de821478f3554e8cb82ecac9fe30ae796eaf348ce28f0
SHA51290b06eb6e66a93af9bd716e6e9ad10fa45570e647f87088e7056171343ed3fa5c85652411835cdd2d703cf9f789dcc45847567985ddf41c90b4ae31db4c54cf9
-
Filesize
6KB
MD5bf0ce1d14343ed1f3b8a1140db468b0d
SHA1b499b7cfefc69f3b12013b1a800daa5ee53efd3b
SHA256f4787f4b1b661f80d204b79ff93421067e389ffcd51aaacb8a7eb4c4eee48078
SHA51232c5ba40597b7c52b139bfe714833f34faabfebe27567b4bd5d6019e53a449767a6b405fa6111eb082d316535876d4ff44cd38e56dad30a1d7a509f36b360094
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD509e88b7336b2853c429e019856bc91b0
SHA101fc835482b036f31d90e8b7f5fe90817192f450
SHA256938ac2807bd1a974711b76707dec133b7065531dca154829a58cff1a7610c54d
SHA51204a67e5c17427db500158ad62dd97b23890b646a1e84b1c1ef411a4a73a6af3dc29df623147b8372ba56a9370371eb86edc2ddc3ddedead3b445cd9a1dba5f4f