Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 04:10
Static task
static1
Behavioral task
behavioral1
Sample
d381bb34ebc12fcd85e86e54bffc5cd8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d381bb34ebc12fcd85e86e54bffc5cd8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d381bb34ebc12fcd85e86e54bffc5cd8_JaffaCakes118.html
-
Size
53KB
-
MD5
d381bb34ebc12fcd85e86e54bffc5cd8
-
SHA1
4889a723a9cd0e31af120324bbc95c6b30554979
-
SHA256
d8a25af986e4cf76f1f948cffdef515d6e84e48c194e65ad31ad1c982b1a2fe1
-
SHA512
1ce5d65ce1123c7891d1ee57eb395e261e624120ed2c17c301a7f623049168e86a54d1feacc00e6a3a1e9b0b4c33283bbdf09079a7b8e8be596a0cb241492ef1
-
SSDEEP
1536:CkgUiIakTqGivi+PyU4runlY363Nj+q5VyvR0w2AzTICbbcog/t9M/dNwIUTDmDg:CkgUiIakTqGivi+PyU4runlY363Nj+qT
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4924 msedge.exe 4924 msedge.exe 992 msedge.exe 992 msedge.exe 3916 identity_helper.exe 3916 identity_helper.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 992 wrote to memory of 4640 992 msedge.exe 83 PID 992 wrote to memory of 4640 992 msedge.exe 83 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4728 992 msedge.exe 84 PID 992 wrote to memory of 4924 992 msedge.exe 85 PID 992 wrote to memory of 4924 992 msedge.exe 85 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86 PID 992 wrote to memory of 3672 992 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d381bb34ebc12fcd85e86e54bffc5cd8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff889ca46f8,0x7ff889ca4708,0x7ff889ca47182⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5744 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,16387784159439030198,6948904291482539946,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
5KB
MD58af897bf4fcff5280e4b0b971f890cc1
SHA156aeab8bf66bfb91cc03f7a9578c631973586468
SHA25652f1a5f2553dac8742ddd7a58584ef2fc382d7117fc99d05ad03ea29ea4b3a08
SHA5122f0d3ace9fde004007629b8e77f6b46fdadc95fb5f980412c8c186da63ed1345f440c2e9f8ed04860a7d830a32e372fc1ecf3d638427005a634078345c935edf
-
Filesize
6KB
MD52291edecd20471c1cc72b8983a5b051f
SHA1207f228ae8f94de9219901ec4d6fc1649a6fb6ec
SHA25677c4ec1511d2c41031abc9ed2f44da05d66d56d770c7a9f713a45fcf2440de4b
SHA5120e140303fcf52d8a2f81b43c4af2eabb38d17aaf3ad43819559b95ae5379461f1280d19510b24d982c545de56e8aaa325cf5435c31285e16f0f9fa7ec161882b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD557482e98b16aaeeafab931b5606b547e
SHA1ade0002b71b86ce95fc0956f1dbe01f013a39edd
SHA256fe702f0ef5fe069ecb9138efcceb6c42f604403767f574201b3fab8356e6640e
SHA512f884281c419c5873f25722b15085ef2ad452822b5351d083f72aa63e118857a1c702d39003573ecfbb733e7e419bb02c4c8b0b0b357b0617cf371916465e1e53