Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 09:20
Static task
static1
Behavioral task
behavioral1
Sample
d407073d846610e67f09f50b80b03ea9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d407073d846610e67f09f50b80b03ea9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d407073d846610e67f09f50b80b03ea9_JaffaCakes118.html
-
Size
22KB
-
MD5
d407073d846610e67f09f50b80b03ea9
-
SHA1
ee0a1c3abcad9e11a35ba51c8af47f149ded0118
-
SHA256
3f634638df2648620a40d7035a48e240092ca3e0d6ba12810c857f58b7814ac2
-
SHA512
fea45fcb1e1c7f757e42107deb3b4383b12a5d19b1110fe4e2801ec8a19b1ab7d7b86b6d86a08871ee9ea559ff66b9cb821c1a721a898e05d2e056f2341845df
-
SSDEEP
384:SPIh5rj1rApIlUpKfGQJszEPnutBQ+fanxCsyNTbJKy31iXsR:S7mmU7PnufrfanxCsyNnJKy31GE
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2916 msedge.exe 2916 msedge.exe 3764 msedge.exe 3764 msedge.exe 2300 identity_helper.exe 2300 identity_helper.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe 3664 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe 3764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3764 wrote to memory of 956 3764 msedge.exe 83 PID 3764 wrote to memory of 956 3764 msedge.exe 83 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 968 3764 msedge.exe 84 PID 3764 wrote to memory of 2916 3764 msedge.exe 85 PID 3764 wrote to memory of 2916 3764 msedge.exe 85 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86 PID 3764 wrote to memory of 4548 3764 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d407073d846610e67f09f50b80b03ea9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff0dc446f8,0x7fff0dc44708,0x7fff0dc447182⤵PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17991864054241929786,16721059748246532748,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,17991864054241929786,16721059748246532748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,17991864054241929786,16721059748246532748,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17991864054241929786,16721059748246532748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17991864054241929786,16721059748246532748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,17991864054241929786,16721059748246532748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,17991864054241929786,16721059748246532748,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5220 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17991864054241929786,16721059748246532748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17991864054241929786,16721059748246532748,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17991864054241929786,16721059748246532748,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4968 /prefetch:12⤵PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,17991864054241929786,16721059748246532748,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,17991864054241929786,16721059748246532748,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5368 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3664
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\50464cfc-6b75-4469-a5c9-e8d03781c1c6.tmp
Filesize5KB
MD5fb9ec32268137a93609a0d44495a88d6
SHA18cefed94d15df41215cae688b4e533d2aaeb612c
SHA2568f57f86781000309f81384371df22b45a3678776ee894522ce5db5b8e194f400
SHA5121132a4476a6ccea18a054a09c24f08ca7e0e26a7a38952237457e30cd6906c57692758aac92e6e1ccdd55b0263147a99fd5dababc9ae0da9c2511cb8fdfa04bd
-
Filesize
6KB
MD5acfa093140e4308400956bf804b20b9f
SHA1a0d0a96cda5acb82313f6faa670a29faa7b1ad2f
SHA25661f118556d4ed541f406592857606275de46fa86a5a6881731607a383d95dfe3
SHA512bc628135cf9ae12a227b02ab6d573143fb641aa540bb9459ee712f167f8c196e21aa1c5018e870395c92bcc01fdd8ef57f6acd0d555a7e42c154573cccc284ef
-
Filesize
6KB
MD557125a9c81d8e7d923838f900c8f29d5
SHA16f35942b0444cc86b85da7bf2577876bb48ef51d
SHA256bae8655ddec78d76c897d94b05d970fd70dbc505ba71af742909b7931c3122a1
SHA512ee9a3cdcd5a5c720deab6f3a716c68e58a9d82c261392b8645236f5eb401f5a97699f3909ba9f093fa222de11fe150223467222b1ad4badfbc9e6900e6a409b8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5b353a3fcb1fbbe0c6c4348416efa0804
SHA112c8ef43c3f7ed0bfbe37e982c0307350a338234
SHA256765d59180f670c4849b8950b8462e343c4ac811f85f4795c7fb3951fbc4be78c
SHA5121e5f6dd57d80914f486c658dcc53f58618d245669c92a5d2677c25a482e5a39853f4a985edda8bfb1d856076443832e173ca2eecc4c6225f94ad4bb48df032fc