Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
d5021ebc4424f0b7f3a7ae909ebf8fad_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d5021ebc4424f0b7f3a7ae909ebf8fad_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5021ebc4424f0b7f3a7ae909ebf8fad_JaffaCakes118.html
-
Size
4KB
-
MD5
d5021ebc4424f0b7f3a7ae909ebf8fad
-
SHA1
dc0b393346dc64a13dd02b89b7804ceeb3c61196
-
SHA256
62e7d37ca0b51805ff135f63de6e98b2a1b80941ccae48a0bba60f3d6577497d
-
SHA512
186a2e5b12eaaa69f8ecd549cbe1a541b2762bfb1e70b03f7b3b793168741a9845a0dfb4c4f179ab65da943b99a01192ad2176b4e3fe20ee4ef02f511736b113
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oPIoAmXd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3524 msedge.exe 3524 msedge.exe 4420 msedge.exe 4420 msedge.exe 4680 identity_helper.exe 4680 identity_helper.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe 1296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 3756 4420 msedge.exe 83 PID 4420 wrote to memory of 3756 4420 msedge.exe 83 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3652 4420 msedge.exe 84 PID 4420 wrote to memory of 3524 4420 msedge.exe 85 PID 4420 wrote to memory of 3524 4420 msedge.exe 85 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86 PID 4420 wrote to memory of 3520 4420 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5021ebc4424f0b7f3a7ae909ebf8fad_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb50146f8,0x7ffbb5014708,0x7ffbb50147182⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,12937178936138380149,1785959115628216029,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,12937178936138380149,1785959115628216029,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2336 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,12937178936138380149,1785959115628216029,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12937178936138380149,1785959115628216029,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12937178936138380149,1785959115628216029,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,12937178936138380149,1785959115628216029,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,12937178936138380149,1785959115628216029,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12937178936138380149,1785959115628216029,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12937178936138380149,1785959115628216029,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12937178936138380149,1785959115628216029,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,12937178936138380149,1785959115628216029,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3744 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,12937178936138380149,1785959115628216029,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1296
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
292B
MD5d238f113b701ae94b9d4d4a57400cf25
SHA1995caaea660486d9fd43ff856899e39c2e319da4
SHA256de5e06471ef3176ee2bb4031f5ea10c1d83e4b38ee2db60a3cca56bd6965464e
SHA512b0af37bc5d04a2cbae106ec44e29e4a11fa09eabf1627225a373706836aab1f9098704bd15476ffc034e00184eae89444c45cb8ae27c6ece2b824cd9d81a4047
-
Filesize
6KB
MD55b1c1db98db728561db80da6e87a3d1f
SHA199df76a2dcef9df7b73e10ef6bb2f4f15e7b5d3f
SHA256ad38ba0501bb7cd2e5719682bb95e6ad5251064bebf9380e27b587f4689d2d90
SHA51291600162613774667085ba448cd5c2a695c355b996e7c8f53b7fa1a9d962ad2db6dd1524d1a9fa90da783db6073744b5ab8d518d902d2671dfada94b5b7bf096
-
Filesize
5KB
MD5fce1aff065d3c14fc44817b23fd9d0b4
SHA1a7589f31beedcbdf458466292825543d176ac90b
SHA2567715dba19307ecf7e58c286ce666acf75a20dcb408730d736d7d93cfcd4c9b96
SHA5127577cbbcd06aa883285ac342fafb43c0cc2d7f222771854ab8286603799faea82aa8c416a7d4eb2bbb49c69d75bb8eef0d7c86a006f957ab6b322f139498e4c1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5cc6fdede79ae357716a614f458b2f116
SHA13c97f5cf75474b4ca409a1a5985a7254efc7989b
SHA256e8ce4d527cff3815b07be84cba2c5287bdba67e0e3828db65e45f4899e22672f
SHA5129a4d45ace63e65324b0e99fe9d3126f445892266abb972c5cc4470d4d57346e10e8efbdaa81e08893b4b5c5fffc4514c50210a5ea256ddb9a7aaca4153932f0f