Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 04:42
Static task
static1
Behavioral task
behavioral1
Sample
d390346cf9327e3ca11a608715af1c08_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d390346cf9327e3ca11a608715af1c08_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d390346cf9327e3ca11a608715af1c08_JaffaCakes118.html
-
Size
461KB
-
MD5
d390346cf9327e3ca11a608715af1c08
-
SHA1
03b95182da58f36912fc980b82aa599811ec78ed
-
SHA256
a38d924cd0a40acbd56454d153c4045b05f97f7fa827d09ae4dffbc3ea5c8955
-
SHA512
dbbb4d2d5f64613f9b06163b801cfec22d287831550bd4a2876e4fd0c485ecf50fb845dced5342eca457e69f2c72f5e852a337d0b365f017ef2d85772a391704
-
SSDEEP
6144:S5sMYod+X3oI+YaQHQEsMYod+X3oI+Y9sMYod+X3oI+YLsMYod+X3oI+YQ:i5d+X3N5d+X3T5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1008 msedge.exe 1008 msedge.exe 5100 msedge.exe 5100 msedge.exe 1212 identity_helper.exe 1212 identity_helper.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe 4648 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe 5100 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 2212 5100 msedge.exe 85 PID 5100 wrote to memory of 2212 5100 msedge.exe 85 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 2468 5100 msedge.exe 86 PID 5100 wrote to memory of 1008 5100 msedge.exe 87 PID 5100 wrote to memory of 1008 5100 msedge.exe 87 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88 PID 5100 wrote to memory of 4904 5100 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d390346cf9327e3ca11a608715af1c08_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffbc36446f8,0x7ffbc3644708,0x7ffbc36447182⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6486105307525866385,3491309253387644498,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,6486105307525866385,3491309253387644498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,6486105307525866385,3491309253387644498,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6486105307525866385,3491309253387644498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6486105307525866385,3491309253387644498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6486105307525866385,3491309253387644498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4544 /prefetch:82⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,6486105307525866385,3491309253387644498,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4544 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6486105307525866385,3491309253387644498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4648 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6486105307525866385,3491309253387644498,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6486105307525866385,3491309253387644498,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5156 /prefetch:12⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,6486105307525866385,3491309253387644498,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,6486105307525866385,3491309253387644498,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3292 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4648
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3952
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
6KB
MD53d11a6606a6ea456e138606e2a84c283
SHA19cff65ea2e6c086bb35279421856819fe98e2820
SHA256b9e37708def218a751f7f93f29fc9751b7a1a79afeab97e2122fab75fc5b0c36
SHA5129701288af34836db4629505c449e2a11a52a093bac318978e489ccb320ec95192af21536e9c157f038d7eb64a96da9933876e82d891008ceaa08b086b3dc4bff
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\cfc41913-307d-43f0-ac78-bde037ca862d.tmp
Filesize5KB
MD5922b4554aa7dcf5f7a7617681c27d29a
SHA19a8949369fbb1fa118b3bc891e0d7de47e933997
SHA256fdeb01c2b52fe5e42aed896b29043a221700ee4e3fabe1a174a79010ba8c86bb
SHA51277bf369a8c75f38b19648c331b095aa02223f281bcc4060ca62ce60b23111066f7221b29cc3ee7ca06615058c78992f48f78b162c27909ea4c4c8b04c9671eb5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD56834e31a955a3392b88e70fbbf83401c
SHA1606ba59d9597f26ba06f579ca96364c131e431d1
SHA256d5dc127ee61fddff733ed2e69477899f47a1e2ff90818077a8080c623aa26335
SHA5123cf67757517dcf278248db65957bbc15d79ec21b389450e034bacd4b588ef9e8e7ba75d1599a7f10f7bca1f533e51759af06431e273374a3e31b5d8e71ea05d1