Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
d425595d0216c5ac4edab05a1c95a439_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d425595d0216c5ac4edab05a1c95a439_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d425595d0216c5ac4edab05a1c95a439_JaffaCakes118.html
-
Size
207KB
-
MD5
d425595d0216c5ac4edab05a1c95a439
-
SHA1
49531c0b6da2baecaf90fbdf02c7098f4a27be60
-
SHA256
8898008eadbebba56f287c173da8c3808f2fb59aa705817f9be785293de95efb
-
SHA512
35001598b9af74f6284ae69b836a231ec73335ef09f3befc000cbec86ffda35e2f12b8ea8b01ee8e7214beddfd11bdabc8515b90635d992a5381019261a7a91d
-
SSDEEP
6144:i530DH6NEQwjcHXxQRVufJc/0911kLX5J:iuDHQmjcxQRVufJc/BJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2164 msedge.exe 2164 msedge.exe 1832 msedge.exe 1832 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe 3024 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1832 wrote to memory of 468 1832 msedge.exe 83 PID 1832 wrote to memory of 468 1832 msedge.exe 83 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 388 1832 msedge.exe 84 PID 1832 wrote to memory of 2164 1832 msedge.exe 85 PID 1832 wrote to memory of 2164 1832 msedge.exe 85 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86 PID 1832 wrote to memory of 1448 1832 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d425595d0216c5ac4edab05a1c95a439_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87df646f8,0x7ff87df64708,0x7ff87df647182⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,5795085407016535557,15650068481985802247,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,5795085407016535557,15650068481985802247,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,5795085407016535557,15650068481985802247,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5795085407016535557,15650068481985802247,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5795085407016535557,15650068481985802247,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,5795085407016535557,15650068481985802247,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,5795085407016535557,15650068481985802247,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2720
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
2KB
MD538358d8699a14f6bb3fe32de4602d7e3
SHA102f525f1bb7a6ff5707d5b7c77e31baad8d6b6e5
SHA256c5b5c54c2e367d7b5cef64a2234b82bda7da268d60f8bbc78b1b6a335dc7937d
SHA512dcbb4319bcf13809cd01892d71bb69a29aada5fdf441b62a578596dc0fe25b6cee33cbb02ef522f6e6a961b2ade8b1334324945fe27bcd7cf52f96a80317b3d7
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5fb27c96a8a77fa3158c8c75027990a62
SHA116d95879f4b4516c2473cfb1ee868834c0ddf034
SHA256c941224cff09b6eaad7439eeceb26e760f60ba1d4b56f43581b7e6feada88f35
SHA5124f284bcd617376be49de3e72db446febfe1a9ea1e452f97d93c7cdd9b72800d846fdcf2de3d53e1497745d22d6736ec1f196304c993fe9c95c9878e64f5bbdb6
-
Filesize
6KB
MD55b814bd3fc88a39d81ced88908c52c07
SHA158ffeda4fef8b99076ee27e2a9b640a55ecc31ea
SHA256072c9074cfeffa07fc0277560b0d60ba51071e7c695b60e3675878ce55c06dbc
SHA51238d12cf09cd332e3fdfc7e40f08787b616a5bfa30c9f545831e177631a12741f948ab378a9fe0b0981467d9a1bf55c05d795481fdee9bee87fb79ce967c3bc2f
-
Filesize
7KB
MD5d9cff7c24af8a661a19c9966a46d196e
SHA18dda0a1fca181c338909dd4c1ed501fb2c7517ea
SHA256905e1db18188ac9c2ef93a88ea89bd6f797034771e09557a6d14ecf9e9fc5c42
SHA51237bc369ab7e14bac1d8ecdd6e65bf4c2c24f9d4337649a94b8281248e2987b7725265c4baebafd4677c0d99428b9c99b6f90a9d341e9d396a821bf0a11ca6048
-
Filesize
1KB
MD500615e5a8d10477902a35bede4ac3af4
SHA1052d29fb1d2e6a19785b2c5782605ecebbfc6ba0
SHA2568dcc2391dd15bae37424e5a3e0da7acc7677b14073045b6eec3ea4fe98682fa6
SHA512165087afced00ec0ff75332d237f049e92aa1971c5dbd17701dbdfd7f7da205e5346eef45c2545b09bf2e64a2cfec10202ca21fb16496505971e4583dd79a8ae
-
Filesize
1KB
MD5578fe6a65af5a5d2f8494c8d1ec14de2
SHA1c6ba66d306a36696931c59b3cd533cbe966942aa
SHA256267d5f58bb2d25797fd8b26aaa35e9d3d43147253db4d3b100763dce5eb7d8a8
SHA512c950a4621b6d52b7b5032486a2d9e83a6815c027c5974bbedca87339cdb5e4c25f537961aff7ad7c08c2a91a5a74dd112a5ff1a440d7e05d819746a53e67f170
-
Filesize
707B
MD59f611b8f7afa67c20d6f04cbc4234617
SHA13f052fd1dff45b4a975ef4b3e543de81e063bf19
SHA2565932b0f17e3159fd8c6fbb8fc7035ccba90abef2da7e3ec7d0ad1d8a2d20d0fa
SHA51268edc6129ab3407b79d3e84897e4f2638e6f96def442f84d6b51f1cebe6593119a6598f9bbf539193af71a9353c2224fd6021f1c209bc1e3abe9156b3c028bc0
-
Filesize
10KB
MD51c8384f78e7e8493df3cbfb2c3cd5c8b
SHA14e23ce5b4876a527681013fbfdb1f2a70da23b30
SHA2564a4084fabe207fba755a3d6b76e28c0a8de1122ae17f5c80eca69e3478be50a5
SHA512fe1fb4ea31b17a61127e73c3bf5dbf5e38a67c8355493b2fb699c6a630754121c34b8712ccdfab6344d19dd85cff87ae1fe465601a2aa2fc1df2b9ca9c0f56dc