Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
d48d3bb95d93f8dd5571cc1933dd3482_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d48d3bb95d93f8dd5571cc1933dd3482_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d48d3bb95d93f8dd5571cc1933dd3482_JaffaCakes118.html
-
Size
209KB
-
MD5
d48d3bb95d93f8dd5571cc1933dd3482
-
SHA1
52d776bc5c9dd36434f90d59af9f4fe311d3a5e9
-
SHA256
99672b35f6ecb93923abe0dd3a9fa4dcb971749280a06ec7075ffa790149df38
-
SHA512
f306cbac9f5bc32af64078bf18ce99bf9531100910401fe1231864465188f22419b1bb1a328dfbc7e775f4cb7c423db76bf88505769098ad5b7bb3c6217c4807
-
SSDEEP
1536:ILx5dhJdsf0U6uDgdXHh8HH6wrrEo2U1QTxQkKZvarsfBhmDhN813Kut1dv2qJR2:00DgXHOHawrX7fdOoDPBy8QTm0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 488 msedge.exe 488 msedge.exe 2236 msedge.exe 2236 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1808 msedge.exe 1696 identity_helper.exe 1696 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe 2236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1228 2236 msedge.exe 83 PID 2236 wrote to memory of 1228 2236 msedge.exe 83 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 2836 2236 msedge.exe 84 PID 2236 wrote to memory of 488 2236 msedge.exe 85 PID 2236 wrote to memory of 488 2236 msedge.exe 85 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86 PID 2236 wrote to memory of 3036 2236 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d48d3bb95d93f8dd5571cc1933dd3482_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeebe946f8,0x7ffeebe94708,0x7ffeebe947182⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2116 /prefetch:22⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4704 /prefetch:12⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1696 /prefetch:82⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1696 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:2900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5640 /prefetch:12⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,6789945014301544455,7857030166267688794,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:3540
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
180B
MD5e75179806fdb60b3337e8cd5b04cd6cf
SHA1434a695c7607996cc4d1a0698d9214afe4d9fd38
SHA256a121c6f8b11a0682ab639049f50ef2a1b00b3a2a565d7686cc64f501056b7b19
SHA512e1e2f888005696fb33453f369efda963c71c15270338db02d812a1ad503c1dfd2a0f693c3f6a02ca2abb7cad631524b0481141646353c7b39adf44b09bf8464f
-
Filesize
5KB
MD5059b2f8afb2eaf157666243c860cc17c
SHA1f1c97af3db7992e0c65c01777786c15abeb3e2c4
SHA256eaea09fc5143d125cbea8ced5a149568f22f0529b379b2b2b427f7a555966f35
SHA512b152b583405a22cd7a8f1c904a002f44b568d4c6acf22c1d321e010955c03bb19760abcc76ab52155f304b95bd6868957f1fcde755b8f3a5a21c7a845b237da3
-
Filesize
6KB
MD543b6386d4a3011201e0982db11ec9ab3
SHA1e630b905fc837a9c130614ebf0fa06601eb374d2
SHA2569c350b1e083b11b122a059a2279337135327f096d998b5b7cea9846c26e4c6af
SHA5124b59e1f745312a624e95d01b140b56264a0d5c5abb579d92449d119bc608bbe4c654a5d1078187132c3486d52bd62296289fd42c3fbe38556e6028eddee9c968
-
Filesize
372B
MD5d37e007dcc5bfca37a4b50cc8cceab2b
SHA15966da8ee78672bcce49d1e8b4b8c448075c0ca7
SHA256986d1618bf7428a392a96a7a32ae6e1d568a579b9b7b1fcfc4befaedd79e8867
SHA512aaaad398cbb89737442385a04bffca8af49f7268ecbd035d9c728e45f09103028d7b8caca6327361442dc867bf2d863b13311894eeb582c358603ae641d5075d
-
Filesize
372B
MD5a46d02d58803ba673e0817fb0cf176d0
SHA1da260beefd62a95b66a22738637a9e3a7f16cf62
SHA256c9769330776cbd287dd57c5a8a1b67bbc32a9d3a65a889502903dac948fe295d
SHA512b0c7bfc8660b357105268de07744e06461586dcd5342e33d479342894421655399dd0af724e72ad8a829d7ae6e9b900d0c922086774a0db548e438476facc8f3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5848dfb56696d692dab2ad75d8941aa27
SHA1609d5036d7b5d58500bb05c3293e16a792f9cd24
SHA256389758a551667f1e03c7932ea02dd6b0d1a085fbabdba2f675b2d767f3dc2881
SHA51235af0e90e2f9976a27a6cc0c5b33ab298ed3e9950d064909594d270cfba00fd0048b4abfce8ce4efa329aec255571bccf41497ba80c7e81167dcbb1b753e015c