Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
d41f6339c13317de6a72ee323594f993_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d41f6339c13317de6a72ee323594f993_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d41f6339c13317de6a72ee323594f993_JaffaCakes118.html
-
Size
193KB
-
MD5
d41f6339c13317de6a72ee323594f993
-
SHA1
82f295b7c8250385f844939ee2ef3881f2c8c426
-
SHA256
b93dc6e8bb38332f7bc089fd9b67b6b6ea0bd4fb55a6726a467b2d7959957693
-
SHA512
050da9a0cc3dd7905150fa28f27241339812b301e79e48ed8065b8e0cc24cf0943ad3a663141a99d07f10a5a1dee11a5eb41f28f4435a787af7807876875c040
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcqGYHAnuML6CM0MHzcZl0MScp:s3OXLqHz0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1976 msedge.exe 1976 msedge.exe 2372 msedge.exe 2372 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe 2036 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe 2372 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 4484 2372 msedge.exe 83 PID 2372 wrote to memory of 4484 2372 msedge.exe 83 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 5016 2372 msedge.exe 84 PID 2372 wrote to memory of 1976 2372 msedge.exe 85 PID 2372 wrote to memory of 1976 2372 msedge.exe 85 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86 PID 2372 wrote to memory of 1772 2372 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d41f6339c13317de6a72ee323594f993_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba3b746f8,0x7ffba3b74708,0x7ffba3b747182⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6721077051902929126,15274545658957910429,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6721077051902929126,15274545658957910429,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6721077051902929126,15274545658957910429,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6721077051902929126,15274545658957910429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6721077051902929126,15274545658957910429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6721077051902929126,15274545658957910429,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD5944bec303fda88838810b760f2cc75c7
SHA1f795b888f61dbcd90bb0062c25326d31ef59bbeb
SHA256eb2c74b60029c3ce584d922c8294d31b4029bab2ea0e46e015bd69cce2f6aca4
SHA51288feadaf4038e1e54ca3a226c0616e79120e084ddbb20f653067022106f0f7de497fa37991ff46d6e5514699e4fc5447b2b5b23f41528794e94c9bd2b0c01ad9
-
Filesize
6KB
MD5e15c7448f3c907e89ca877242f64297d
SHA1617b2b05359e1b3b4fd2446cc7b27c437c215cf3
SHA25660b1929cdaf3337650c4a6ef07b67ffb336ebc3c06e5540911c854680e76b577
SHA512f33ae0fd5b5a643812ce534a3ca638e96c16a5d460209a2d450a8b6405791ecaee04d78d9f46abf3641472508dc6860046a90fc593d848c824dcece10ea58b6b
-
Filesize
10KB
MD55fae487a95bd5a30eeb62709cd052db0
SHA1f5a5108cc0fbb5fae54bb20f917abdfba1d8df42
SHA2564653959edc2864f56b61c9835242d51b0378c772364fadcf56f0250036df4cce
SHA51232e5e160cdb99f364bcff677d83b06634ba318103531d020bc94509e84d87c47b564e60c1112bf7cf6a4c781cd9f214a3d223ab892d8cc67267353cbbf676580