Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 07:17
Static task
static1
Behavioral task
behavioral1
Sample
d3d2c697a5b15ab6552ec141449f4e7d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3d2c697a5b15ab6552ec141449f4e7d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3d2c697a5b15ab6552ec141449f4e7d_JaffaCakes118.html
-
Size
21KB
-
MD5
d3d2c697a5b15ab6552ec141449f4e7d
-
SHA1
cbc964cd5b8320cee8d933cfe32619a78e931578
-
SHA256
acb4c1f9afa0811b92f54f3e7d0fca2e22a4df547fff67a46ad3d582810cab8b
-
SHA512
e0875884709fa84974f1708dd83e3abe8da9d67c6c4d4cff6da6ebfd676cdac58657d214e81e0a897395fb870789ce717b63ee37d6d43ed9f51e941cc5e16a2f
-
SSDEEP
384:QfRIjUDGO2G9kLL9j9F2OznaEUdJ11vFlFt9kitZbRJgR5MKxv+H8q1dCjoL7ZWX:QfRIjUDGO2G9kLL9j9F2OzSh4e4RWKxV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2280 msedge.exe 2280 msedge.exe 2072 msedge.exe 2072 msedge.exe 3392 identity_helper.exe 3392 identity_helper.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe 2072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 4532 2072 msedge.exe 83 PID 2072 wrote to memory of 4532 2072 msedge.exe 83 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 4524 2072 msedge.exe 84 PID 2072 wrote to memory of 2280 2072 msedge.exe 85 PID 2072 wrote to memory of 2280 2072 msedge.exe 85 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86 PID 2072 wrote to memory of 2968 2072 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d3d2c697a5b15ab6552ec141449f4e7d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9568446f8,0x7ff956844708,0x7ff9568447182⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5920 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5036 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:2612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3984 /prefetch:12⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:2732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9591507125454543706,1436071245467374237,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize72B
MD5e186f36ff8f505f9dcecf19f89064aa4
SHA18f68a8e18c6cbdd5885f52184da278ec826b5510
SHA2562f2c9e9be82c4e58f8cef657cbaa6c963b3ec25785c9b09bbb1426b1f9ea40b9
SHA5127e57bd5e4d6407d5240901012d95ca1711d62aef920e33609c2a1708790375c4290f597365c03bdf214fe176302dc7aa9a3d34998acfc3a5891a65a24faaf8b6
-
Filesize
844B
MD5286176077d8dc7b1c1500313175f005c
SHA1af0e4633137721b5052f15e9bbac308d7bae51c1
SHA256b48792c384b0818bdf949a02861820c2b5964cb9ee050fd8e191e6ef0783b28e
SHA5127bb5107dc29852402ccbcce62a0c1300b2c62f733dc40b87b6d3168361c69d9683d0892b07b68753bc786dc6f44a110ca183eb2061187d91fad693e7ebd90c18
-
Filesize
576B
MD527d7689bb74211fc387b42022cfdef68
SHA1736ede055f76390a7e5a97960e096ba1d559ed6b
SHA2562f4335969ff254443cd7c5b8eb86d2fdc87d0a3e8d3608b728111fe6a6b9157c
SHA512cc3d550a2020de8baae0226f6ce6406e783dfdb13c8a976c725e7e6b8c2a0126278e7c58fc21b2a827f2fa3e285ca5eb2fa5aefe31bf948641cd59e2dc8ab956
-
Filesize
5KB
MD5d0120a69eae3d17d9556d227fa39e826
SHA11fbd1b2ead8f2d57d0444bb8c911c7679c4b10ef
SHA2566794dd7940b6f9b0fef507e3fb863a5a1df85b67e6b51158ac2a053ec1786c8a
SHA51208b6dc0d282c920e2480e239218b8c180a07f8bc10272ba926451c6961869461cea8c79ad43c0a71a2166534cb1ffcc2e2b64915f297fbac1373adf0f29e6a01
-
Filesize
6KB
MD52152961ba2dd34562906bdf82f3ac9fc
SHA1009b3a2dc0af688a52a39000d7b2c8f7fafe667e
SHA25610be49d6ef48714700748c7737472d02cded39681485291cef96394db48d0b5c
SHA5125d510da84d8ad3145d608a44ef28cb6e3c453f907b7ecf438f7495fbfc481db7349c859b42a900064ef55220184752f136898b5742e4bb9869705b7bb89e40a2
-
Filesize
6KB
MD5ab5f5f776b18da3b2333106024655725
SHA13487f167f480a6dc8a8b4aa985d94512ce804e49
SHA256bf61e9f318ea61f5545eac5b837b7dee8b2144c40f30fdc542286cf0098f0235
SHA51249e7c03b49f6a572d9c4f7773ad1a9d2ff15d2224e105ae1d1fce76296b8a995b2b9b5148d9e2166f6c634f8ca7242f12440fa44f82e4f4ea8cf7804d12cde70
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5961631e9dea3d9326f261f1ea8921b03
SHA1ba830e86e2cd011ee6193f8837eb8c7de4706665
SHA256687121bda2f498fb91b46d5e81a5db559711a7d59c983d8688ddcbdb5f9c0925
SHA512c82ce9d51f5f49967c2b691842abfa6da1f555154147659534600b2a13387abd1f9201d60a171d93d546404b753310473592d8cca68582e213e0230c9fec31e7