Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
d749410b69010c7bf91286855b8b1522_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d749410b69010c7bf91286855b8b1522_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d749410b69010c7bf91286855b8b1522_JaffaCakes118.html
-
Size
52KB
-
MD5
d749410b69010c7bf91286855b8b1522
-
SHA1
7f1a45ee8cfe85003e7671cfe177f9d6204067d0
-
SHA256
ff6eeccde2894c96e0ba3a2b82b71f02313cc17cd72c6ef5f3ff40c25a8ba27a
-
SHA512
6c24939a46261722e54e1d35c96d35a07db891730d58df779c87dc27680a3b51eb0aabb20c822c411e1d772b3ff0ccbec7d8f8a36716bdbea89de2df6b8c1e3d
-
SSDEEP
1536:SZQUcOvU0+yHjc2HfeaiDktVzlUXd2Uokq:SuROjXPodVo5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 888 msedge.exe 888 msedge.exe 1336 msedge.exe 1336 msedge.exe 2508 identity_helper.exe 2508 identity_helper.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe 1336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1336 wrote to memory of 4548 1336 msedge.exe 85 PID 1336 wrote to memory of 4548 1336 msedge.exe 85 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 2752 1336 msedge.exe 86 PID 1336 wrote to memory of 888 1336 msedge.exe 87 PID 1336 wrote to memory of 888 1336 msedge.exe 87 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88 PID 1336 wrote to memory of 3076 1336 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d749410b69010c7bf91286855b8b1522_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc434446f8,0x7ffc43444708,0x7ffc434447182⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9909075179070888942,3580956484117277764,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,9909075179070888942,3580956484117277764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,9909075179070888942,3580956484117277764,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9909075179070888942,3580956484117277764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9909075179070888942,3580956484117277764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9909075179070888942,3580956484117277764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵PID:4524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,9909075179070888942,3580956484117277764,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5436 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9909075179070888942,3580956484117277764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9909075179070888942,3580956484117277764,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9909075179070888942,3580956484117277764,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9909075179070888942,3580956484117277764,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9909075179070888942,3580956484117277764,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4176
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD527be87ffd00c680f4748df5fee975bc1
SHA12737e5e9523438b2e30bbde3448089a0f801f64e
SHA25657d1ee9fe83c2219d9f6d88bfe41e4957bc06218ac056ea253c6c7b01b5bfcda
SHA51219f7685380ba24c386f282bdd40ae1337ed7fb9f950074a30553d44b5745d7351c514548f61b91916bac885478e11a4fbcbd979baecc9ac81315b5bb3441c793
-
Filesize
6KB
MD5a9ebf86354ebcc607df1f746482389c6
SHA117ac7bed42b41da6a7edac6d51e7894c98eca661
SHA256947d9c9d434929ab7e39fd91d00900f0c5e856a2b9ed6eb964ed8d13ff9d9789
SHA512b319cfff65b7cea2cd31f25c0e91fa3fc2432d5269267aba2d8cd69308dce2c6435e754de8f542098552166e5564344a28e898e502d24feea2c0aa075f300196
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53b32366ba9665242a445ae9c9ebe709c
SHA143892071d741b890d93daa2436364f15e27e1911
SHA256ac58e04a5e14ed26b6959413221b3b9703a2d279f50453aacbba24110e916ac3
SHA512caa9a04ed51bf20628202272c496569d3ca0e20a2a80d01cfd87384098bf2ae2a3d1648934cd6663f1d233b3fb7fc9d2ad1ea0785d7ca48004ea19114753ba33