Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
d3b07a5e36754efae33e9f10adb9ec4d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3b07a5e36754efae33e9f10adb9ec4d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3b07a5e36754efae33e9f10adb9ec4d_JaffaCakes118.html
-
Size
74KB
-
MD5
d3b07a5e36754efae33e9f10adb9ec4d
-
SHA1
b0717b8e2c15329f8bdb30fe02cb87b36df267b5
-
SHA256
48b784f8ba764df44554719f62926d662bac67cc69fe17e9d4b2bd6354d213e4
-
SHA512
dac439acad42b69a0b9dd620a5feb5b9285b1e6410445003d119671a4809907bf8cc2491fe7e225112379be7958f8a8dc26d16ee89bfbdad1375471815ff3015
-
SSDEEP
768:ke2GO9ldkeBglmsZXl0/XWggr2NnvcBz69G:kDGO98eBgl6/Xk6xcBz69G
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2216 msedge.exe 2216 msedge.exe 4404 msedge.exe 4404 msedge.exe 3472 identity_helper.exe 3472 identity_helper.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe 2288 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 4632 4404 msedge.exe 83 PID 4404 wrote to memory of 4632 4404 msedge.exe 83 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 4288 4404 msedge.exe 84 PID 4404 wrote to memory of 2216 4404 msedge.exe 85 PID 4404 wrote to memory of 2216 4404 msedge.exe 85 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86 PID 4404 wrote to memory of 4840 4404 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d3b07a5e36754efae33e9f10adb9ec4d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe54e446f8,0x7ffe54e44708,0x7ffe54e447182⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,10165638066858369830,17693563232643559389,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:4288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,10165638066858369830,17693563232643559389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,10165638066858369830,17693563232643559389,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10165638066858369830,17693563232643559389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10165638066858369830,17693563232643559389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,10165638066858369830,17693563232643559389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,10165638066858369830,17693563232643559389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5384 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10165638066858369830,17693563232643559389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4776 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10165638066858369830,17693563232643559389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10165638066858369830,17693563232643559389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3752 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,10165638066858369830,17693563232643559389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,10165638066858369830,17693563232643559389,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2288
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
550B
MD5ba98515cf4a9612dd1bf8fb3804731ac
SHA16c9f15ce10e514cba362e3dc3aca25008bbc0296
SHA256b1569703f899a09a628c4b18f24a6443fef34ee2b0b4da2ea563b033c2df2d6b
SHA512528bd38ac5fdc527c6525b83c45acd8707c211579632cf352af73674715d4534f4faaf722b5f181777dd6a7769473c3b4d59a0a75169a66da2488dbba8d6abb7
-
Filesize
5KB
MD59d2c5e9a5e53dcc969d9a359b199b5fb
SHA109fb3b0f89068d2c3f6d0ee3da0cc446d4133169
SHA2569d35c36448c40236e41ec48922b8ecb96bf3cf5368b49ba8f923bf036031057a
SHA5121b840528bc500af0b9ff523ef6a9fc71d85d53c36100458f75c429555af5e69e34429dcb4d6e24abe1f9fbb94deac98f2ab954ff992dc67409b5411a703608b7
-
Filesize
6KB
MD53511536e7e75b83cac1730ca3289e9b9
SHA1233afcc6daff88cf2d6cf6d9c1f0dd871573dcf0
SHA256b1ae8690a64ddf31fd375d3f9e309af3f8d2a676fa3ead5145070aa22009eea2
SHA512cb4dc49e6dbe5c208192ac230b420d3c9de9fafc1acac90db8c1a5deb2a7d0bc0ab90a00061cd2e995f9a18462a00ac65287cdced3912eba59bf2b2b50ed7613
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD517740e5ed7d305fab14b99e820637ea0
SHA1abf4e2c4e85117fd9d2d87c33fabcf7f7fe28ab5
SHA256d24cd8fc823e0744738f2e223d94cf9dc5bbc30592e4b053ca95d435dbde7c02
SHA512c4b4d9ffac9851959267a75d419ec76fb66acf6e30d9a83de4e434200d817f4496754d8f20abdf0172d750be2468ad724a1461f78b825f2234bccf83246e0cfc