Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
d35d0dc1f5fd3bfa2ad2e5a66da8f4a4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d35d0dc1f5fd3bfa2ad2e5a66da8f4a4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d35d0dc1f5fd3bfa2ad2e5a66da8f4a4_JaffaCakes118.html
-
Size
201KB
-
MD5
d35d0dc1f5fd3bfa2ad2e5a66da8f4a4
-
SHA1
eb136ae42d1080a2dec6704ed73dd183580c20b5
-
SHA256
6134c253754f03bb53b9151f0905be1baf28660b2212f4096cefd7cbfebfa53c
-
SHA512
38d0d0e7e5a2242f7d828f081ef3eb3882455fdff950f0b3a91447ab75698f4b8bb3c55ca75d6dd11dbaa2de011869df48aa22f1517dbdb858fe74b31425c468
-
SSDEEP
1536:ka67Mc8BYmknhGMJghQzctVXS+OLB8vP9PNz6UdzF8oGvM:d6kVXLPf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 3940 msedge.exe 3940 msedge.exe 3856 identity_helper.exe 3856 identity_helper.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe 1912 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe 3940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3800 3940 msedge.exe 83 PID 3940 wrote to memory of 3800 3940 msedge.exe 83 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 4672 3940 msedge.exe 84 PID 3940 wrote to memory of 3632 3940 msedge.exe 85 PID 3940 wrote to memory of 3632 3940 msedge.exe 85 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86 PID 3940 wrote to memory of 4540 3940 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d35d0dc1f5fd3bfa2ad2e5a66da8f4a4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffade9146f8,0x7ffade914708,0x7ffade9147182⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2836 /prefetch:82⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4280 /prefetch:12⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5632 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4272 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4468 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8790424355223960494,6114933078660089847,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2480
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
5KB
MD597f9eb11cfd527175f259144a3907174
SHA111e3795809ab1a08742577cb2b9d312e831830ef
SHA256ca90cda42d1bcfb316fd01b8a0a0108ecb4b04315d5b1857d49c8a0128ea5b0c
SHA5122a45c818bd910602d01b697942cc4af97b3753e37644004fba65f65fb15e2d63b16c28ea962e2d88699d19814e7f015eca4d31c17f60491bfb81be0acdaf89d1
-
Filesize
6KB
MD51b2cb8fdabd3f3b0804338a086077884
SHA18e2935dbdfd197027d82098bffe20d466f22f3ab
SHA2566381983096ab004a20fb56b7246487aa22a65cab9568d95f9c6fa5d67d86439e
SHA512bf85496b8d6316705a890c03c99cbb9763531d1dbc415e30c71b7ab6465681e1836fac4debec3babc2c0addc61cea859d31e63311dbb059d43d5dddf685a5e89
-
Filesize
6KB
MD554c4aedc4438225ee04a48bf9adc5168
SHA1202efc4560f5fc4a0e2796a0cfd7a36bd3a205b7
SHA256a34bbd05f61a3703b9a98eb227e993235210bf65ca5ba43d2ab21637c2036dfc
SHA51241e6625e7cbe67f7190300fe67a99f303294b4f52700949683071fcd30526f52335105de402b1cec4465234684d6b912826900993907001f7bf4c778ce1bbdd7
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54625e0b9b15b7cb4b237699faa2b2051
SHA126c9398f52f9378217424c855cebedd60d495d9b
SHA256fec04e206fddd886fa063b99ac156e3372e37459f27a01ff3410e3f8da22a3c3
SHA51228da845e461b22c27a09d2d261b2f42b604e7e3d6f9983230016b78dd4dc737d187354b9bebea39dc3b338011b917c5687074867bc7c32f5c6d01b6018828f80