Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 05:11
Static task
static1
Behavioral task
behavioral1
Sample
d5b40270ecedbcd12ffe05df3320d17f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5b40270ecedbcd12ffe05df3320d17f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5b40270ecedbcd12ffe05df3320d17f_JaffaCakes118.html
-
Size
31KB
-
MD5
d5b40270ecedbcd12ffe05df3320d17f
-
SHA1
acb327e33a2f39890022991fde0b867eb5efa6ab
-
SHA256
762e80a73d1f37fd2be36434e2375e1f55df2322e0439592acc84ab5d1d96b0e
-
SHA512
c4967c11c7915888f07e39590a17c6aac017b3941df6048b457687fe268becd2c415f23618e5d0be7b1c065428521fbcabaeeffdd57f4893d5c96f3d2353357f
-
SSDEEP
768:8mvXvV6BCxF7wxx9JKo7zFuQK0IYoOmjWDupIH+Y/RQE:8mvXvVuCxF7wxx9Yo7zFuQK0IFOmjWDn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2980 msedge.exe 2980 msedge.exe 4716 msedge.exe 4716 msedge.exe 3420 identity_helper.exe 3420 identity_helper.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe 2592 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 5044 4716 msedge.exe 83 PID 4716 wrote to memory of 5044 4716 msedge.exe 83 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 1348 4716 msedge.exe 84 PID 4716 wrote to memory of 2980 4716 msedge.exe 85 PID 4716 wrote to memory of 2980 4716 msedge.exe 85 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86 PID 4716 wrote to memory of 1924 4716 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5b40270ecedbcd12ffe05df3320d17f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff305346f8,0x7fff30534708,0x7fff305347182⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6112 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:4132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1644 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4068 /prefetch:12⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,3843525065335476348,1865246757098077458,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3884
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4356
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
2KB
MD5a07a86cb44e67ae39c4b0358b6a8b1c2
SHA197d4cda586a878601ee9095d7f7eb80c8640c424
SHA25661ef79573809cef0cb9a3c3aad9190f4b06c00824f11bbd2f98d394eaedb0bbd
SHA512c0175d603bfdf281967e78324e0f915b1a7f954af0955353c1e1728a8d6dd68da66c500753e686df8da75c91271dc6e8259c4bd5894d46866f3443ba1611c30d
-
Filesize
5KB
MD5621f832063fc5aeda8221988784e21e4
SHA13aa6c7927e4ee662b22ec4fd31faaa56106de651
SHA25688c4531e9e00903730ac5178b888f155c484e2b14886a41420293d90a0fc40b4
SHA5121cc35f35f3f878a055e22640d56646f080ead8026bfcf3112c75ffbcdaa1be3af7e4c67e95cdd9cd3b53af16e1c2046b4745e02a8b33cbc3e4366b736a98a236
-
Filesize
7KB
MD556093b3f00185135d42c315858192d72
SHA12619b00f7d63351f7e33b02de376d59891dc1be5
SHA256b3c3b808c9bc38eb9e6cd2e1adb348e88ca1cddf7efe0030b14f80bc092205ca
SHA512663ec7ebcfb2dea531c3698f704cf6922b757a476e392254c1de6a1f48d031c49dee775c22a1f297610d33039b8fa06b5286c6b831890c1a2c7a2119f556ef15
-
Filesize
6KB
MD56e6026be2590eb8b8a714fdcfc869fff
SHA175a04481797daa268f99a995881af30f18d1c141
SHA25622d6c20b73ea86c290c0d1a21a4cad020b5f0fd43598f01ff9c06dc8326bdc07
SHA512d10d74824350e8314b0f9ec31f1ddda20548b7702aaa6eefc5c5b9d76533565e703f3e2ee1b3647c14bb97d5ca255622efb2c71ffc2b2f55056f4c098b48904c
-
Filesize
1KB
MD5544dbcc1368d51a39d2418ef0af465f5
SHA1f7131a985db6ebcc5c39adf2493a09a7df0ed754
SHA2568ed00e43f8fdd4d9e80f783ea28b522ccf20bd0bea77082070fd81c128ae01ca
SHA5122828bef54802121370554660a0d439fc92b1035a58250e53135f32ba7f96cec762fc8ad030f2196d215df917a21609d6b3fbdcd68c4a71c46972c5f4ad48e328
-
Filesize
707B
MD5129d4aa72c28bbe09e40ac561e0a5b18
SHA1035a1bf1c883f28d38559e59ebc25d2b2567b2db
SHA25688c4a2cdaf1fa3f3d521eb11d1bf5d0bd452547d30b39f99bc2371a2045b2544
SHA512fb2f0a084928ad3fc5fb0a4a1871760edcc538126e4febd74589f94f7de82e64863012c2d1e6c424928143589d35ab97eef765799f2937ec5ed4f2c307550163
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5624ab671dfc1166f78a2f7060667d991
SHA1412988087ead09a2f8057ece7b678a49b2624515
SHA25699b3467996846789764ee556c5f7a796e5b24c21e6c680e447eb3295a3b514b1
SHA512ac9aaa681c7fd37a3826c0fc9a1b3ab929917e5523ddbd68afcd36ce4d16045d0e93c2ed797133f9dbd1d2dd5e3abc520e66396ca7aa87e61dd6078b57eaf3dd