Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 08:15
Static task
static1
Behavioral task
behavioral1
Sample
d3ec9fe22c8fa00cbc3167cae72e9738_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3ec9fe22c8fa00cbc3167cae72e9738_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d3ec9fe22c8fa00cbc3167cae72e9738_JaffaCakes118.html
-
Size
67KB
-
MD5
d3ec9fe22c8fa00cbc3167cae72e9738
-
SHA1
f74beee261cb8cf4cfc36167cd10c15346a536a4
-
SHA256
4aa33b8f278b6a3279346312ce5a62c91149ef2c0be49c3d5c48a40e392579cf
-
SHA512
43fd45ff7df627e319bfea9938081a1cb379be7a626d689b022cccd6ed9249684a49aa0f7b40e94d97c9ed652c06eca588ef5376a7ad20f6a58066be3d3f388c
-
SSDEEP
768:JiPgcMiR3sI2PDDnX0g6sKCioTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVG8s/k:JV1TzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4068 msedge.exe 4068 msedge.exe 4312 msedge.exe 4312 msedge.exe 3280 identity_helper.exe 3280 identity_helper.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe 4312 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4312 wrote to memory of 4228 4312 msedge.exe 83 PID 4312 wrote to memory of 4228 4312 msedge.exe 83 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 2960 4312 msedge.exe 84 PID 4312 wrote to memory of 4068 4312 msedge.exe 85 PID 4312 wrote to memory of 4068 4312 msedge.exe 85 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86 PID 4312 wrote to memory of 468 4312 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d3ec9fe22c8fa00cbc3167cae72e9738_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4312 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d48d46f8,0x7ff9d48d4708,0x7ff9d48d47182⤵PID:4228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6389157545705440836,5003866473454772105,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,6389157545705440836,5003866473454772105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,6389157545705440836,5003866473454772105,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6389157545705440836,5003866473454772105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6389157545705440836,5003866473454772105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6389157545705440836,5003866473454772105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:1368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6389157545705440836,5003866473454772105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6389157545705440836,5003866473454772105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:1708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,6389157545705440836,5003866473454772105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6389157545705440836,5003866473454772105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5532 /prefetch:12⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,6389157545705440836,5003866473454772105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3140 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,6389157545705440836,5003866473454772105,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3080 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD5f0c5cea8fb193e3c6025719444fdd4e6
SHA13160c620a351fc2f591e8c223339be3331967acd
SHA256b7cac4bddd9c32f405ad6af9e85ff73fdd6624170df1fc0139495bde58c38568
SHA512522841d0282e4aaa6dd8dc60fd1acdca09ddc308dd20fc42b476149ede628622df06267ab07b77377edbd2a5c2bf94bcaf7d2c3851a3185fa6ec0e2d1f37b871
-
Filesize
6KB
MD515147e150cf6035b753162d6752ce6b8
SHA13746c7565acff91856f3db957b11f0fb9a6b70c1
SHA256728f1c5a17ccceba6ae14e5b10b93790790f7a934352d012a8e9dab41c2c770d
SHA512ed543b604b19a0fe6016b11c064f98eeaf0cff7c68dc7af8ba8395c80e7c9e944de5ec141242ae5b00b8bf59b8c63f268b098bb1914ac6f932531881116e1411
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD588c6a8b8a4a85d6c5c6f9635b4ccb99d
SHA1d72692cdd3fcb7d29ff113f84b2e48f731daf0a3
SHA256ea1992f284cdfad55d78c5657eb28d2170aeb9cfea2299957fbf7379b53347f2
SHA512ed39e4aa8a47922f1f7efb41b0c42b8e1320934a7179c0994960f9f3571aec9c1befd6974348ab839803040ebced6ee42057236f20e07065bf0c653df3f760af