Analysis
-
max time kernel
145s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 09:15
Static task
static1
Behavioral task
behavioral1
Sample
d404a8f465de37e147a270334c1ac920_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d404a8f465de37e147a270334c1ac920_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d404a8f465de37e147a270334c1ac920_JaffaCakes118.html
-
Size
34KB
-
MD5
d404a8f465de37e147a270334c1ac920
-
SHA1
19bc67e424043c0c3ffd541011532e28dccd6bd3
-
SHA256
d74247c4309735cd55e34dc230f45cc94b148cf71031ca59b22bdc23e4ed4343
-
SHA512
ffafb8659e0ef26e1f6de1bbe7d674cbd0bf915f409ac98c7b205d2de2a3d314e13175c3829432a30afb48c2374e6f8460909aed2de2b336f7d0205318f70502
-
SSDEEP
768:j9jPRv1Y4nc6rWIZ02sS7dFewzMnhXMNRzAvqT0H:j9jPRv1Y4nHrWIZ01C+wzMnBMNRzAvqM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2496 msedge.exe 2496 msedge.exe 1028 msedge.exe 1028 msedge.exe 1156 identity_helper.exe 1156 identity_helper.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe 4764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe 1028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1028 wrote to memory of 4508 1028 msedge.exe 83 PID 1028 wrote to memory of 4508 1028 msedge.exe 83 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 388 1028 msedge.exe 84 PID 1028 wrote to memory of 2496 1028 msedge.exe 85 PID 1028 wrote to memory of 2496 1028 msedge.exe 85 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86 PID 1028 wrote to memory of 4772 1028 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d404a8f465de37e147a270334c1ac920_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87df646f8,0x7ff87df64708,0x7ff87df647182⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1504,10184767229249656104,1019582426145456622,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1504,10184767229249656104,1019582426145456622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1504,10184767229249656104,1019582426145456622,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:82⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1504,10184767229249656104,1019582426145456622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1504,10184767229249656104,1019582426145456622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1504,10184767229249656104,1019582426145456622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1504,10184767229249656104,1019582426145456622,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5992 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1504,10184767229249656104,1019582426145456622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1504,10184767229249656104,1019582426145456622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:2956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1504,10184767229249656104,1019582426145456622,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2028 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1504,10184767229249656104,1019582426145456622,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1504,10184767229249656104,1019582426145456622,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3560 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4764
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
418B
MD593744b12a608f7f82195eb7c489c2258
SHA1515347def0dd25f8dc3cb668dd9d0a97765b6874
SHA2562729233603dd7a5c4686e800cc1c7a0222669fd69053251e3e999317976c2490
SHA51214fe1d4652b9ffa9885daa38d7ab2200676de5d39e1dbfb12aa89048a6c30c19a4948002adf1e4daae4b49aaeee87cd052388ea72b4402d88f69667bd14238d8
-
Filesize
5KB
MD53e379bea68292a6ad30f2b92000b6005
SHA10ed01da31a16cc953f4693d382bce4c4ae24181b
SHA25683187786a72efa49346d84b19cb8558cdb84970fcb61e59118b0d6297e31b1bc
SHA51270d6fd07e17f5734b1a211106affea4af880d5e7ebc76e6db6956fadf5ddeaea31a8b48871420403a84fa4d4efb6f245e28091aa911c2df1da5926d8982ae465
-
Filesize
6KB
MD54d4dff328beffcec8c0d78b45a2eed41
SHA170adfb40181fb0eca2350ef3554fee2910e86ecd
SHA25614a8176924fa5ef22dde061784ef97bb29ba2c10622f1a1214d97eec342af0a4
SHA51247057c56014b83f5c38c14c66c15fa21eb9ea7c7a21153ebcc06bb824abea1ddf70c407a6a0f6e10184dcd5fcedb42ac49b5eea13d34d7fff77567097ce278ea
-
Filesize
6KB
MD573dbb49933b1ddf5ae181263e8f66fce
SHA1dca25ae885d2063345b9d68eaf985e05f75bda9a
SHA2564120fee25ad32f283616f0fa4d6c07868ba3a05282de8a5b8ad9f5e78d1ac508
SHA51210c0f4868b87a49b66904947bb0f53d710c0f39474bb1c4dbeed02a4402e1d279ac2830286e5a81536fad5a46c6a50c9ec103cbe52adb73bfe15eee51e181397
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD548c0d37a1a6327ced7092a926d121a32
SHA189136ffdde0bafcad496c92ad4792a3067a957e8
SHA256044306ca4707f94102307a4fa6ab124267380b506caaecaf7d575226306f94d1
SHA5120bbe74c18939e68e6242582aa9ae05f1d20876c3a32a20949768cec530d125b70afebc1c52eb5ec1b3371499e79c56923d6759e95ec4e81e5bff7daca1e83d85