Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 03:58
Static task
static1
Behavioral task
behavioral1
Sample
d37c3bf2f1ab066b5cf02be571343620_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d37c3bf2f1ab066b5cf02be571343620_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d37c3bf2f1ab066b5cf02be571343620_JaffaCakes118.html
-
Size
186KB
-
MD5
d37c3bf2f1ab066b5cf02be571343620
-
SHA1
d1dea06312c17475902d722355c04da2e5dec018
-
SHA256
c3944fe18d9a1dd24e815feddd2dd1ff82e9005e906850944b234300cc24b5ee
-
SHA512
f074b8dc8ec97fe73bf05073dff31e5d5ea793343d2dd82705bb1a9a598337cf6043880afd846f0cde71b222b09eeb26aef2215e7f298fad73ff2b298c2c7d45
-
SSDEEP
3072:gyfkMY+BES09JXAnyrZalI+Y6XXI6EyA8:dsMYod+X3oI+YS1tA8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4504 msedge.exe 4504 msedge.exe 1668 msedge.exe 1668 msedge.exe 3392 identity_helper.exe 3392 identity_helper.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe 1668 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2216 1668 msedge.exe 85 PID 1668 wrote to memory of 2216 1668 msedge.exe 85 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 3148 1668 msedge.exe 86 PID 1668 wrote to memory of 4504 1668 msedge.exe 87 PID 1668 wrote to memory of 4504 1668 msedge.exe 87 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88 PID 1668 wrote to memory of 3884 1668 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d37c3bf2f1ab066b5cf02be571343620_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcfc5946f8,0x7ffcfc594708,0x7ffcfc5947182⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17211214828964295496,16262606580243845834,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,17211214828964295496,16262606580243845834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,17211214828964295496,16262606580243845834,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17211214828964295496,16262606580243845834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17211214828964295496,16262606580243845834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17211214828964295496,16262606580243845834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:82⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,17211214828964295496,16262606580243845834,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4800 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17211214828964295496,16262606580243845834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17211214828964295496,16262606580243845834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4100 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17211214828964295496,16262606580243845834,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,17211214828964295496,16262606580243845834,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:3224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,17211214828964295496,16262606580243845834,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3372
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD5e0232b954acf64332c6907e8a8055b41
SHA1732917975ce26fc790ada8f9fa642f24ebeadcbc
SHA2566555961f1b1669d398d566f49f7cbc5082b9d82503c4bc2b7df74b434b66fddf
SHA51271147bff3e4ce52ab453743d9575b58364aa066c79f00321d4340dea12749c021f28853de06df4685a1d2c9ea384206bcb32fc42d3ad29e8d52404b23d15e86b
-
Filesize
6KB
MD5fc0059380e1c1ed4be2826a9ed3a4a32
SHA17615d261321d83f62b1b44784c04501e1edbd6c3
SHA2567d13aa41b361ae2ab12f253523189fc492d606370e0ffd6a4e21d384c7dd31d2
SHA512a1f75e8608eca3ee225c774eb6cbf5d48209ac4f2b252a04e223a910f85c54ca04339f764d4e14ad8fcc642f1621811df7a290effda1b3463bca3b99be5bf660
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5373435ca86cc2ca581dc9485a6701a8d
SHA1b9fe39807ed692dd2073093f1b79ad952ed12c09
SHA256b709e17064f3bf1a1f629afa8cb3e2a6b2a1a3db8ba716668e76b219823305dc
SHA512c71c4cee6cc16b71f190dfc36b030f8931ef0fbf0d288643ccb71252e4ba11815b5dca61ffc9d0dacd6fe3be7d2313b551dc42dd702769bb7b31598bc98abb27