Analysis
-
max time kernel
146s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 11:36
Static task
static1
Behavioral task
behavioral1
Sample
d4448ecc74d4b185e0a64628cb5ca482_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4448ecc74d4b185e0a64628cb5ca482_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d4448ecc74d4b185e0a64628cb5ca482_JaffaCakes118.html
-
Size
460KB
-
MD5
d4448ecc74d4b185e0a64628cb5ca482
-
SHA1
f5b76a07419e9468d8dad03c549e3dff6ab8f7df
-
SHA256
04b429cf9ddc1ce7052ce782df005c5b7dd1b022b1599176390f952bae17bf0f
-
SHA512
640edac239366d9bae9bd644a53c96f7d870c4e5e4c54553f2b3ab357f2c70ebaf82e691050e44f942e7a6646fb5ce308378e11a8b7ec7f1edf5b8a30eed7f30
-
SSDEEP
6144:SGsMYod+X3oI+YMsMYod+X3oI+YasMYod+X3oI+YLsMYod+X3oI+YQ:Z5d+X3U5d+X3q5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 1216 msedge.exe 1216 msedge.exe 4444 identity_helper.exe 4444 identity_helper.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe 1216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 516 1216 msedge.exe 83 PID 1216 wrote to memory of 516 1216 msedge.exe 83 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3408 1216 msedge.exe 84 PID 1216 wrote to memory of 3624 1216 msedge.exe 85 PID 1216 wrote to memory of 3624 1216 msedge.exe 85 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86 PID 1216 wrote to memory of 1448 1216 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d4448ecc74d4b185e0a64628cb5ca482_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff914d546f8,0x7ff914d54708,0x7ff914d547182⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10203494400905926494,2669295511840338457,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,10203494400905926494,2669295511840338457,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,10203494400905926494,2669295511840338457,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10203494400905926494,2669295511840338457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10203494400905926494,2669295511840338457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10203494400905926494,2669295511840338457,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,10203494400905926494,2669295511840338457,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5156 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10203494400905926494,2669295511840338457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5256 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10203494400905926494,2669295511840338457,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10203494400905926494,2669295511840338457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3444 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,10203494400905926494,2669295511840338457,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3440 /prefetch:12⤵PID:644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,10203494400905926494,2669295511840338457,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5448 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD52c713e2532368fbc21cdc6213aa1ed56
SHA1bb60705c10d9d7b9a95c3fb3ef048ec635541b56
SHA256e0b858b3831c7a581e96947abb16e58da002bf8de68e764e2a34ea1ab16442be
SHA512050dc1a0c59b50e225e921eb49c2192882dfea5be8e7e07fee86dba5d6cccd9e4b22a492e136e2d877d2ab31dd3302a330f042278a1f833d97a20b09bb880d20
-
Filesize
6KB
MD508d533059d3c3af76ef897058130acbf
SHA1f292abaff10b3998a68106b3746f17380c006c6e
SHA25636629717487c2849566adc35afc051b2586dc3ef18716724ae827a64309437fd
SHA512b0307ab3842622a9ddce91195951edeb1c8d744dacc6cca23ad25ef02edd874cf94e96b301e6061ad294628e222a9c2b9b1bd5f385a94003c9303e120a85b2b1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD521467a9763b328e10ed339467369746e
SHA1189cbd851dc621bbfa4af21db5107543a2519a71
SHA2567a4b79e160046dac5802c37efe010b65e957e409e532846a214d884d1783fcdd
SHA512c3c7601fa9ec236263a7e81494cac6797ef42a375b2d3c38e2956480e7c1df4afa7fb0592c54344446aab4d61922701231eea2560482c1bb8ca3e6d0b811a5dd