Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 10:58
Static task
static1
Behavioral task
behavioral1
Sample
d4339a319d1157d9a699d7f694f6d30f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4339a319d1157d9a699d7f694f6d30f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4339a319d1157d9a699d7f694f6d30f_JaffaCakes118.html
-
Size
31KB
-
MD5
d4339a319d1157d9a699d7f694f6d30f
-
SHA1
ff31e4ddf7c218c8b3f723d8ed5df90be4652c57
-
SHA256
84d9db8767d108368363810435cfedcb3b6eb759b5559686eebfbbd71664b009
-
SHA512
39bce661d809515836b1659b18249b5865704fc61ae96a2c39e5c56c84705170036dbe4d69069138011dca8736c2b3b70e2ea21a614d917301749ff6abf497fd
-
SSDEEP
384:SIX67P+if6jIBkD1AIBIIII42jQL9TEDbvHIdkT3nY4VZeDLqXZES4IApEuEJ:SZP+ljIGRjC9b6o4feXg4IbJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3676 msedge.exe 3676 msedge.exe 3148 msedge.exe 3148 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3148 wrote to memory of 1172 3148 msedge.exe 83 PID 3148 wrote to memory of 1172 3148 msedge.exe 83 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 540 3148 msedge.exe 84 PID 3148 wrote to memory of 3676 3148 msedge.exe 85 PID 3148 wrote to memory of 3676 3148 msedge.exe 85 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86 PID 3148 wrote to memory of 3516 3148 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d4339a319d1157d9a699d7f694f6d30f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff51c846f8,0x7fff51c84708,0x7fff51c847182⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,8061172995099529702,5426799755182764986,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,8061172995099529702,5426799755182764986,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,8061172995099529702,5426799755182764986,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2448 /prefetch:82⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8061172995099529702,5426799755182764986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8061172995099529702,5426799755182764986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8061172995099529702,5426799755182764986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4892 /prefetch:12⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8061172995099529702,5426799755182764986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5188 /prefetch:12⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8061172995099529702,5426799755182764986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8061172995099529702,5426799755182764986,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1844 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,8061172995099529702,5426799755182764986,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6564 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
276B
MD54c30418a9144fbed918c2d7ad0f09749
SHA164b3723cdfc11bcf09cdd7afa43748e9c172bdf6
SHA2567bd59ead9ea777572f101f2c7656796efcee4edf4aeb692be7bd26a720e1406e
SHA5129c76ee8593db466841e3561b9b2f71396c68774762a575636ae8fe0b4ae5967c045f52a861130e11c51efe3899e40f7fafa752ded583a2a4a8bbf3c622c76842
-
Filesize
5KB
MD582067f0b629fefeebb96d9ab5227dc00
SHA12f2f66176931ee73311b648d636cda911db9715b
SHA256078bb58c682567f58609c97f4f9bba451fb34b0cc920c1fdcf15e39e42030830
SHA512663c80fe798528b4e9ad1657495dd6196f71f7deb8139ec3b2934522331afd9db6867c31da29ba5ebb188ddfa7e4765ee1fd5ba5b507b590b3f766992e7ff5f3
-
Filesize
6KB
MD5ed74b6bfe529568c9108dc7816133488
SHA1b42d7f87a6d22bfe7a75f7e66b445b12790d66bf
SHA2560424be1d2186a8a3add16f30a7b7824340c1735b7929064fa7f5fa3ad796c328
SHA512052d447dce5c2d282259caad74ea562ed70a25d4f718f8e19185703b69208e9afd2f7ed848c6113cc2c1e289f1cbf94e8f9b4bbc44debed80cc47ecc3112bb18
-
Filesize
10KB
MD50a528266a6c0e9a3c653a532cd0a5c6a
SHA1c2604c2052dae6668f4d50667f9e1257ae1736bf
SHA2565d92b19cadf503c1f99039a974027f1165a6a3d3d34239d34cecbaffebef104f
SHA512d3e589133d2cf460b3a5ed85552b329722c8d8893faa610066616ae71d68019f347958e724ecbe29849693ab36ad223915878cd9dc9ded08dc115c1c2f6f1155