Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
d46bb6e68c8128b0cf5bfee18075272b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d46bb6e68c8128b0cf5bfee18075272b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d46bb6e68c8128b0cf5bfee18075272b_JaffaCakes118.html
-
Size
11KB
-
MD5
d46bb6e68c8128b0cf5bfee18075272b
-
SHA1
2d982c8ed478dadacc1af2983012115fca2dea0c
-
SHA256
77dce4fff1c47ff079c1e9cd27c16c31a749fe8e468e01d7364d0818f05d8282
-
SHA512
73da677f768b8240d8f97ac6be253af8f563927cf1ffdff761c39890d3ae2608f416f8df0eb9608e4a30aacc1ce8d7504c5a7bb13b847e6aeb7f1bf64ca64b46
-
SSDEEP
192:uiopjmh8tX/U+gtbcqEllbts0iUpkT0tVwJBm9w/b6QPyu:uiujmatX/Uhtbe9NpOKKJTb6du
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 3144 msedge.exe 3144 msedge.exe 4484 identity_helper.exe 4484 identity_helper.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe 3484 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe 3144 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3144 wrote to memory of 4160 3144 msedge.exe 83 PID 3144 wrote to memory of 4160 3144 msedge.exe 83 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 376 3144 msedge.exe 84 PID 3144 wrote to memory of 3260 3144 msedge.exe 85 PID 3144 wrote to memory of 3260 3144 msedge.exe 85 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86 PID 3144 wrote to memory of 2848 3144 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d46bb6e68c8128b0cf5bfee18075272b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9023646f8,0x7ff902364708,0x7ff9023647182⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,13182471497029615748,2878621292015571408,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,13182471497029615748,2878621292015571408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,13182471497029615748,2878621292015571408,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13182471497029615748,2878621292015571408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13182471497029615748,2878621292015571408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,13182471497029615748,2878621292015571408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:2332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2020,13182471497029615748,2878621292015571408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13182471497029615748,2878621292015571408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13182471497029615748,2878621292015571408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13182471497029615748,2878621292015571408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:2148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,13182471497029615748,2878621292015571408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,13182471497029615748,2878621292015571408,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2932
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
538B
MD50a5b09598101c60617e3ecd89a4fd881
SHA184871c112a35f473f2794def0a5ef9a7b45d8432
SHA2562abb7176dd1399eaf12ec86249967b07fe2a35809102e662b64b299e83c9838e
SHA512e18479be81f23ec523f70f289924749948bad524d22604034fdba8691f2cbe2851e963a40c29539c63f5e40c4e136cce42ea57f1a1cf7e291230f88b5b482a27
-
Filesize
5KB
MD5f86c98b34cfc52ffc5766018002e6351
SHA1d0d4d09751f7bdda3f065ce1593e3be519f5c6e8
SHA2561a67e269385ca837337d12ee08c2742d7c627935af53d9adddb26c3b7fee3897
SHA512f1fa563edff9f318b7bcfa52faacf8bcb6560e0502225d6dcc152f71deb8cac90eb23f4a9f23e3ee19499bfbfc2b354192e1f85b0fe286cdae3e129504aa15b2
-
Filesize
6KB
MD5b6b02ed7762ba77f6c1f9b54f27f8bb4
SHA1ca606fbfd536c7dbe041831f7ef4c914aee304ce
SHA256e588b489fdebade3b71ef1fad7c4a8d2ac25528f8d78d1f9b2f26e167f428290
SHA5127c4a0f2c6135ca64493b018f6bae709e9f0c340a44aaef0fff72aa9c7893126f5d84fcd704b036495e318f202e746c98828f4110f0c864779005f355973dcebf
-
Filesize
539B
MD5fb965604381d7f02ec17a57130ad93f0
SHA196582ee5753f09e245b588c03dfa3bee22981972
SHA2565089e0f496f227f77bdfc8016a264511bf262094eca5927cb3028a5f1e25bd0a
SHA512c2094d025e6a3f020242ee9bc0b0f13f47fda7c16349b9bc3b669aeb42336ab0742df61b768bc2fec936a6001b7d3f792aac34a19a2cbc8dffc620660d68181a
-
Filesize
539B
MD5cbdfdabdfd7c7fbe7c45ca1a83ce290d
SHA12e78e16f6dfae39f65a6424e81589763b6247bf9
SHA2561b66e2ba5f87b290eeaf91c43a6518d98cfa622d07a59ce1d50f9de98fb84112
SHA512c96412f51079f0c30e5c16c9a0f6e9932fab5e505417c018e523363ba75977416a302df2aee80242e877e6b3bce2376b4cfde60de204f35607b79e11c82165dc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f23ade0aceb6cbd5387d623f54f95e9e
SHA12e4202ba2d92716dd0d092b1a4a5b760b70adb7f
SHA256d1a1eed06b54d748e4077d62a55c106ad3eb49cd0b0049043d3eaacca08d8f0f
SHA51274657cc1e17cc78ea689808420df6004d005f4b26d880556cf3b19fb9e83d7f64a287983ac903b09846d09cf9946d9a35310d6ed97cfbe0a299f02ac454d8e3c