Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 03:35
Static task
static1
Behavioral task
behavioral1
Sample
d371d07fb0a484122719ffc7ddacbf38_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d371d07fb0a484122719ffc7ddacbf38_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d371d07fb0a484122719ffc7ddacbf38_JaffaCakes118.html
-
Size
36KB
-
MD5
d371d07fb0a484122719ffc7ddacbf38
-
SHA1
5b12fd3877036ada14f2b3a2e125a8760f3209a7
-
SHA256
bc0ea54aa9b09409ac9a287476dd1aa37617e607bac61cf486bd9fd64e82a007
-
SHA512
05df9a690064fe8a597ae17a0f80bd09163fd2803865e8032293532ccda4cadd8de3464e66e9439686e6859e49eb6b24f43fc1903968dd140af8dbfd7397e84f
-
SSDEEP
768:zwx/MDTHOQ88hARtZPXYE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TtZO46lrl6lLRcU:Q/XbJxNVuu0Sx/c8nK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1356 msedge.exe 1356 msedge.exe 1700 msedge.exe 1700 msedge.exe 3848 identity_helper.exe 3848 identity_helper.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe 2304 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe 1700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1700 wrote to memory of 744 1700 msedge.exe 86 PID 1700 wrote to memory of 744 1700 msedge.exe 86 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1808 1700 msedge.exe 87 PID 1700 wrote to memory of 1356 1700 msedge.exe 88 PID 1700 wrote to memory of 1356 1700 msedge.exe 88 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89 PID 1700 wrote to memory of 1760 1700 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d371d07fb0a484122719ffc7ddacbf38_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5ac446f8,0x7fff5ac44708,0x7fff5ac447182⤵PID:744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1847871252801126198,3657618325721212764,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,1847871252801126198,3657618325721212764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,1847871252801126198,3657618325721212764,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1847871252801126198,3657618325721212764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1847871252801126198,3657618325721212764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1847871252801126198,3657618325721212764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1847871252801126198,3657618325721212764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5460 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1847871252801126198,3657618325721212764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1847871252801126198,3657618325721212764,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4940 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1847871252801126198,3657618325721212764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1847871252801126198,3657618325721212764,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5664 /prefetch:12⤵PID:592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1847871252801126198,3657618325721212764,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4216 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4416
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
613B
MD5c6c3c2792eb2bd27db25768c392d17b0
SHA1d3a05ee504c7025a1599c60e4b60d3e8978b4fdf
SHA2560ce3639ba8c0def5e5a9ad14e8722bd3bd9deac350787a1d34ec46031d8b6ff2
SHA512f630100c6e17755fe4d850a7ba1ddd1135330dfeea9fff6b8ac7b5228dc21cebd57c21cae471c7fcec793d84cc391361ba154199b4708ace4be41f8da95676f9
-
Filesize
6KB
MD564bc570fcdbba624fcb0a091cc1faf92
SHA1d900cf0e21bd92356aebc5fac390ad10f206f4a1
SHA256eab3e7984087d9098dec6ba8973f560ae30a633403b26cfdade6b0d25c3b9a59
SHA5128d454a369f958bc521bf44fcb66b24972733bce0d7ea7a7f7b6e500099d9efd85ce79c00348339cd03aba4993f847c01cd2d5a2f24cdab958032a8735856908f
-
Filesize
6KB
MD52651a6de8c5120be850aa2f1ed0ce200
SHA17fd2ef9cf639a1ae0c5a816cfff53e9bfe7eae2a
SHA2565d9bc56d89410730c80db2d42a1784b1fcdef3f20f2a9d6a520cdf9cfd03692b
SHA512be64b42901be4f1edeb5a298b72794988120aea4a799d53b9e60bb4cbb4d2a5b5b873d98846924ab83d569ff769259661257b8c305dfdbb60493d2446e2b32de
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56b36736f8fa7bb5ad0d563e66a89ed00
SHA140508f7b207d6aba02a674e9d6de0da4a0bf5946
SHA2561c2f7b522bf1ed90de762a2db2d0ea42e9e7ed499412a5ccad67e77b5c5c396e
SHA51214fa5e0291fdd64726fd3cfe749b11faa41abe43b264a313b12c5a163262b0e81e1ae0ed3ab469bc0add3485c3e63cd49321304992a2d8fae040e2979ff89bbb