Analysis
-
max time kernel
145s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
d59c36cdedf9bc94cfbcab506b45ca14_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d59c36cdedf9bc94cfbcab506b45ca14_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d59c36cdedf9bc94cfbcab506b45ca14_JaffaCakes118.html
-
Size
3KB
-
MD5
d59c36cdedf9bc94cfbcab506b45ca14
-
SHA1
b8b3e76b524243b8de323f4d3f499fdcb4cb6523
-
SHA256
6e93395012bf9ab501f8c8a8f1665ba80734e779b87acb4c95f9595ed1a319f9
-
SHA512
612b9582a9de728c183ad78c68c639271867fdc72a7cde5f8dd5c1f628223f7428f5cbd3399acf58fe0a229732d6b0259e0d37b6a0d8e968c02b167aa39b5c20
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3720 msedge.exe 3720 msedge.exe 3148 msedge.exe 3148 msedge.exe 4440 identity_helper.exe 4440 identity_helper.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe 4776 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3148 wrote to memory of 2992 3148 msedge.exe 83 PID 3148 wrote to memory of 2992 3148 msedge.exe 83 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 4376 3148 msedge.exe 85 PID 3148 wrote to memory of 3720 3148 msedge.exe 86 PID 3148 wrote to memory of 3720 3148 msedge.exe 86 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87 PID 3148 wrote to memory of 3004 3148 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d59c36cdedf9bc94cfbcab506b45ca14_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff51c846f8,0x7fff51c84708,0x7fff51c847182⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2488 /prefetch:82⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4132 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵PID:2356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5368 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5336 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:2716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5928 /prefetch:12⤵PID:3888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1976,6375932603678601683,8169821768181846511,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3096 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4776
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2876
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD58e3d99712746602b6aac450b5dbc5de8
SHA1825b9174b6ae37b1b0762ef1024fc22f4f10b461
SHA256d26e7cb162392350b8cb7d60f396921e1786820ebf515f775a82e63d6cacd07e
SHA512a99e36e6d4a26b330b4f5d92da5ed5ce23c083d3c2dc2e3c44773d8ead58344262c852948bbcd990cee0faa1f1550054baf5521263ad36c09f12f12e7d27a2fe
-
Filesize
6KB
MD590c19b7256511b4ca21488830abdd928
SHA17c4496e1e79b7f8cfacf02848333fd16c8408d60
SHA256662c2b2276777ba996884fb051995172c48f275879a3426e7b19982ae5504a64
SHA5124a2a3e6e73738284fa8d06453dd5fd509e1e23fbe5e63268bf8e97542df87e4061a2748286e1b53befa9178a62a4c45e345666ac48019725d7d77855e8fdd16c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dbceccac111a61342305e542bac35211
SHA1d1750e09aeeb4cb5a871521b0ed34cc35d2dbd9d
SHA256bc31ad01acd0dc582d04d084d783207cf4678d0c041f7b09f720ea89b86fe547
SHA512a4cfc13061bb05371531f506649bd414cfa6fe6ac0d8e99417a6c1755bb25c20c4a639b78e332a7a20b288137ba9495ebadcfe0d2ce2a7c5d6b0c92de5abd23b