Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
d50f0caeb2e98133b014fbe52479f2e2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d50f0caeb2e98133b014fbe52479f2e2_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d50f0caeb2e98133b014fbe52479f2e2_JaffaCakes118.html
-
Size
58KB
-
MD5
d50f0caeb2e98133b014fbe52479f2e2
-
SHA1
95090e2c347a7db3c1cfd8771c4a28223415152b
-
SHA256
091c25578ab3b94a20557bdd40e24404e4d22743235496eff24cce600d956c75
-
SHA512
e95588b1f7a7379bd390d627ea7e642741edb817c15d47856ebfec39ee0c4bf030565763e014cf0cc5bbcfabf8d13d29b2fa6cbb055035c8f83207a13f585dce
-
SSDEEP
1536:v3nShYGnrddkqN0aQQGSJ7mcsGOz3zbfCO3ZyKl:8YGrxgSCFCO3ZyKl
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3084 msedge.exe 3084 msedge.exe 2848 msedge.exe 2848 msedge.exe 544 identity_helper.exe 544 identity_helper.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe 4896 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 4556 2848 msedge.exe 83 PID 2848 wrote to memory of 4556 2848 msedge.exe 83 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 1492 2848 msedge.exe 84 PID 2848 wrote to memory of 3084 2848 msedge.exe 85 PID 2848 wrote to memory of 3084 2848 msedge.exe 85 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86 PID 2848 wrote to memory of 4416 2848 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d50f0caeb2e98133b014fbe52479f2e2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ef2a46f8,0x7ff8ef2a4708,0x7ff8ef2a47182⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7169064505139875805,7107647540728215991,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7169064505139875805,7107647540728215991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7169064505139875805,7107647540728215991,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7169064505139875805,7107647540728215991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7169064505139875805,7107647540728215991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7169064505139875805,7107647540728215991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,7169064505139875805,7107647540728215991,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7169064505139875805,7107647540728215991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7169064505139875805,7107647540728215991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7169064505139875805,7107647540728215991,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,7169064505139875805,7107647540728215991,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7169064505139875805,7107647540728215991,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5424 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
393B
MD5f6b8b2a2cbab69c55e8f61e0a297edc9
SHA14be52275e26ddf2d50eee914478a20fad69ba3bf
SHA25660c4f29886a82e6c78533bceacf22bec1fcbcee6753f9b2cbee03b1723e756e5
SHA512e0909b5c0898a154ac72cac06ff160fbc4ea3c0c7fa6470ecf0f92ad757ec239714f571a40b930c6e69265ee45ed52f62e065e52b6508aede1623f541e8d3af1
-
Filesize
6KB
MD50f7fe51ad843e0391471448822db9d62
SHA1a575257c01b5251e7054cd75ed83ab1b4c3f09b3
SHA256aae4b084c75e68d4c2f6794fa22a42a0ac5e4626eebe08351ea2936eef72aef6
SHA512087dbeadc3b8bec34db13f7af3a12151a4ff7ed4dbba77252bc9a2d17158881bd17dd44cb0b4f33b9b263bdee0f634d35ed03e928bfd6d55eef9bdf9cbd5c214
-
Filesize
5KB
MD58fc3f22199cbfb8c47b18fd5f99cc0b8
SHA196bb71cfbf3cb1f44ec421b295b996597377829b
SHA256ec2e363de60735d0341951082601b47406d531dbe4973c6b0b52a4cb17c4e1fc
SHA512cb867fafba7bf336ee7bef62227d914a19bebb585efdcd6dbcda97e65315a543d99fdbe5fddf09f497d2f672548e6971512feed4dcf77033b9feb6a08acf471a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5af9d5803107faf8ee87907da55f84dfa
SHA1cb52a1c5e9eb7a2b3185f262fcba3a855bb3c95a
SHA256cd8bf6fde772cdf9780ce3aeed84adf8aae92ac37b9b3c9669b2b9bac03cd20f
SHA5123fb7c8dfb7847447933df77db2f317c8e203877d286be75f0295bf4fe47a7d81227e99c5db1dba101a3e52b72b318a2a3a51eb48ed1f8e3c95e44247c4ef54c5