Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08-09-2024 20:40
Static task
static1
Behavioral task
behavioral1
Sample
d51028dc4bd6a5cadf2c4fa0fc2dd406_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d51028dc4bd6a5cadf2c4fa0fc2dd406_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d51028dc4bd6a5cadf2c4fa0fc2dd406_JaffaCakes118.html
-
Size
43KB
-
MD5
d51028dc4bd6a5cadf2c4fa0fc2dd406
-
SHA1
3bfd5f9de38afa36b634e5f859e53f071b4d1223
-
SHA256
fbe7dfaa0018d165705738cef8e1751374216f4e6ad24313d5d3ddc9183ba432
-
SHA512
33066e8ada749304eec8fa4e8c6f7e9c62825006048c09a3caba5114512c415426ae6d17fb59ef37331e11a2ec59a03f9d37be41608260410aa0a78787b15fbf
-
SSDEEP
768:7BskcmmmmmmmBI3nOpRXKVSEpMLMx3tohi7ve1hVshfj2XwC3pr8R6CtfkURzngc:7Ck3I3uRXKVSEpMLMx3toIcgRPtfkURp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4064 msedge.exe 4064 msedge.exe 4608 msedge.exe 4608 msedge.exe 3592 identity_helper.exe 3592 identity_helper.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe 1504 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe 4608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4608 wrote to memory of 2860 4608 msedge.exe 83 PID 4608 wrote to memory of 2860 4608 msedge.exe 83 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 3856 4608 msedge.exe 84 PID 4608 wrote to memory of 4064 4608 msedge.exe 85 PID 4608 wrote to memory of 4064 4608 msedge.exe 85 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86 PID 4608 wrote to memory of 2056 4608 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d51028dc4bd6a5cadf2c4fa0fc2dd406_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa159846f8,0x7ffa15984708,0x7ffa159847182⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,7299518326064454973,18198659435561908061,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2008 /prefetch:22⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1964,7299518326064454973,18198659435561908061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1964,7299518326064454973,18198659435561908061,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,7299518326064454973,18198659435561908061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,7299518326064454973,18198659435561908061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,7299518326064454973,18198659435561908061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,7299518326064454973,18198659435561908061,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,7299518326064454973,18198659435561908061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6072 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,7299518326064454973,18198659435561908061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,7299518326064454973,18198659435561908061,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3448 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,7299518326064454973,18198659435561908061,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4660 /prefetch:12⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,7299518326064454973,18198659435561908061,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1320 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD5631ccfdfb157b68fdccb6448c2190cca
SHA15ab7d20d9691adc32c595bbc5c7203938e35fdd9
SHA256390891ce4cdd8d42d37e69a4f2de6e679cd707347834af0121944458e341224b
SHA51250d4d4912f695dea5b65a3b8a220931775bbd540a8cb5f640df3b3bd7720850166e6e762913633d566f47fcfa00d9cb18896285b0368c20fc692e6690a0196ab
-
Filesize
6KB
MD5942dd8518cc3fbaed58ec7602a06b3ee
SHA1dd6787259a56b48f1f2becfa3709226648786240
SHA256f671688dc1d6e041e6f73538c12524b24241a48d656e746513cb26d106b50ff0
SHA512d1d6f2501aed4cb80899e2a0b8a049d1a86262dfa173c746c303a34284a621037eb3e00d66ac3f460b7174597d6b842e997418114e44c73d4b7bb597cfd5c47f
-
Filesize
6KB
MD5e5079d97adf716ac33ae699fa2929e5c
SHA195ad30aed4a0d06e96b9f60579a4646dc933ca34
SHA2564e3d86162a9dce0ad1502e32ccf8a07d4268df60a3be5072055326f9e017fb30
SHA5124b886d67cd3319f16f7847e05c8b498508328a99aa1739f79c38b696ab94c71ac9da6f50f2005b8345a9f10594a1768b269e20e8d416de260354aff2489d7861
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5eacd826e8d92f44c6d1c5b70bd244e75
SHA14b9afbc937f64572cb96021a95e343e40c73beb0
SHA2562ae388d5dc140ef31dea0eb02b8f1cc50cc0ede774359a30f2231a83a9ce68d4
SHA512427f462bd7404e5ae7e7b1410a45009dab4f87bbd4e87a47c35d055329319561b85e623e2a17f3a17f13566ab21599970b4ef0da6145483fcfb6a4182a9351dc