Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 00:27
Static task
static1
Behavioral task
behavioral1
Sample
d324623601a3dc233fbe58a036efa39b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d324623601a3dc233fbe58a036efa39b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d324623601a3dc233fbe58a036efa39b_JaffaCakes118.html
-
Size
69KB
-
MD5
d324623601a3dc233fbe58a036efa39b
-
SHA1
3f9c20b7fb50b36019e571b3a86124d0edc6267d
-
SHA256
6e8349c7a0c7c734000d826899ce97447b3cffd9b7489b79ff0314e59dadba9a
-
SHA512
8010bc0a56b4111f7f3928aaea96f47b667848cfee1d2a6e320c9e875d7df8e65487ab4dc8a23d6147bbfd491feb09c2883c72fb70ad58f657241cfc638ba46a
-
SSDEEP
1536:Z1Pm/iVgfLmLJg8vKQAG8Bfz1XrpXXuF7rU7kdnZ7PIDwHymVPDN2E56I:Z1Pm/iVgfLmLJg8vKQAG8Bfz1Xrpn2pd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1228 msedge.exe 1228 msedge.exe 1728 msedge.exe 1728 msedge.exe 5024 identity_helper.exe 5024 identity_helper.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe 1728 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 1856 1728 msedge.exe 85 PID 1728 wrote to memory of 1856 1728 msedge.exe 85 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 208 1728 msedge.exe 86 PID 1728 wrote to memory of 1228 1728 msedge.exe 87 PID 1728 wrote to memory of 1228 1728 msedge.exe 87 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88 PID 1728 wrote to memory of 1352 1728 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d324623601a3dc233fbe58a036efa39b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80c1846f8,0x7ff80c184708,0x7ff80c1847182⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6128 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5548 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5880 /prefetch:12⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5888 /prefetch:12⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,10338464582850837338,10522095633744090780,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
180B
MD524710299bd6265d572eeab066df9743c
SHA1e55640d0ac6f3ecd4571213804054781afccf996
SHA256dafcb2ddf0fac65a17d6239d930ecf6b6b5a9042e3fb732489ec6e273ebcfc8c
SHA512222352006844a85ba9072fcdd952bf7657809de09d9adffd2a1a713ea41651f80944cb09dd91b095079b98fb4d5aa540fe160813caf5691bada6319516b9eaba
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
6KB
MD5fc6a9b871d5301a74ce4a7e9746a23e6
SHA1ee8ac8267bd57ee3a2a7f50da8ce56e34fcd4562
SHA2563ac0b940f1ddc4a01f4707a159ab3801a5235934b3798408414de6e074b51b99
SHA51252c7cd9a6c6cb5bfdede7fc1ee11cd5c9c5c903cd02717fc5c2c62787769282e556225548620cc7d7504af33f84f4e188cbf133d38f2afe60fd665e9e756f925
-
Filesize
6KB
MD5256bdca94cde4e4306acff7e1458a85b
SHA17f1b745c2835df129699c25fb09e8fb98f46010c
SHA25677acf2cca21a8b342eecf04bad9c15bbcca96713ea51c8e44ec4cfd209198286
SHA5127f3fb89337cee030b44f900b9cda8519581a754e3dd03bd479d3ae189720e465ed8b9ed37417fb00c98318eadf86d8aae6dd9f53b323503726c344f9f4d61670
-
Filesize
5KB
MD5d86f87a2fafe1f4aa6deeb3c52f1e8c7
SHA1546e4e45476b313483ae542eee1bc40da92bc47d
SHA2561469fd94418db838b041e00310985038e26247b78c20731e8f32522c918b28da
SHA5125396df25d452b3da1a955ee88518416fb9ea15d2751dd39ce4339735a21aff09a955362e4f6ff2a566322fb3bdf6560c973ecde79ee2065531dd70ba5f8e1ab4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bfb8634f6490d62dfd04b8e3434273c0
SHA127e44573fa92a6fc1bc4d9ddb8523463f5432a99
SHA2560860cbb922d06b82eada850c151d22138513f47fbff9061375c7cc92c0f4a9e0
SHA5123ec326e883e718c8c5ba9b87709c2225baa4da3360053ebd78cfce60cdc2f969f4ade77d4f9a4e67fd6ea10c80c49afe810b1e48cd737e99ecceb4de39c7c4f4