Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 13:15
Static task
static1
Behavioral task
behavioral1
Sample
d472560f1d717e69c9397a2af7337c47_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d472560f1d717e69c9397a2af7337c47_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d472560f1d717e69c9397a2af7337c47_JaffaCakes118.html
-
Size
53KB
-
MD5
d472560f1d717e69c9397a2af7337c47
-
SHA1
492a18165c44505c2b06eff52126e90630abd7c6
-
SHA256
2e62358547eb85a3e14d9942fecf2aa2e90e7089800e7bcd5042e1f7380c1275
-
SHA512
c1adb0dfba6a356aeb8c835296eac34e2d99df32815cdd93566e36f0221fdd2824a461296c6d79188e2faab701640bcc1c68b5d78887c04c1727142757614a32
-
SSDEEP
1536:CkgUiIakTqGivi+PyUErunlYa63Nj+q5VyvR0w2AzTICbbSoD/t9M/dNwIUTDmDi:CkgUiIakTqGivi+PyUErunlYa63Nj+qm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4164 msedge.exe 4164 msedge.exe 2988 msedge.exe 2988 msedge.exe 1644 identity_helper.exe 1644 identity_helper.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe 1420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe 2988 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2988 wrote to memory of 4756 2988 msedge.exe 82 PID 2988 wrote to memory of 4756 2988 msedge.exe 82 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 3828 2988 msedge.exe 83 PID 2988 wrote to memory of 4164 2988 msedge.exe 84 PID 2988 wrote to memory of 4164 2988 msedge.exe 84 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85 PID 2988 wrote to memory of 1232 2988 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d472560f1d717e69c9397a2af7337c47_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2ffd46f8,0x7ffd2ffd4708,0x7ffd2ffd47182⤵PID:4756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4668 /prefetch:12⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5284 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5368 /prefetch:12⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4164 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3932 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,9706692100179956753,10986071876700851442,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
6KB
MD5df53603162bd3e8472d70255061a0252
SHA15aa97718bf45d8dbaf5b2242cebfdab2e901e419
SHA2568fe4349a89994181e7bb2f7bdf286adce0ad38e4e219fc886d0d42d5ed47a900
SHA512c748dc16f26aa0b6ed63ebb8a4b3a8c2fa118c6875cb661ecb17ee200f19c7d6aec357db126554704e9f9e23660e51fb09a56be7f313e7284da92d8082575023
-
Filesize
6KB
MD5b0486ff266f09adbf47e58d080004908
SHA1e6e078fab6447442dd29b8257233a97d0f3bcca0
SHA2569066c446d5ec6a554c47ed802a7d9367eea7c2766c6f1afc14fe15e3069c90bb
SHA512aaf678f93c036362d1db696a9aa6f35f29f6b4a4ad6a4ce59f00288678266ded62f34aff9a23ebdcb6cd15d04cdd8944f58f0c3ad703ee5ec305f1fe91c9544f
-
Filesize
5KB
MD5985eba9c8f00e41cca8d7e51d3ac571d
SHA14ac6b94ebf82fbd51c40376db7188328b956fded
SHA256da70350e8f657ceb31689cc496322ed5b3f7528c681bc5102812a9711314a7c6
SHA512c3d50710b07ce5fdff71e1a1f910c95917abfa9a28d40b87e1dcd54e3f81682f0ee929441c94c9eb0cb73e9f7362b81f5b4e37f7531e7e83c644fe7b76e04922
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD58c4a6b4734a0dd2f05240118778c960f
SHA1d3b225314dfd57ed6c485377c64252f31efd09b1
SHA25613374a1df44b8c1ac5b76d522a6e324bcf387724f2ea45e0bf6a1b3bd2983f5d
SHA5123b7a2a32135fc1dec10ac11c837f76c4e3717d99f08cc280b1f2b3074ee7e8adb8aa5273c560beea4536be725083767bdcc28da412af6cf53c8d64fcdeab5eb4