Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 07:40
Static task
static1
Behavioral task
behavioral1
Sample
d5e30d8d3f3696fedcf03a89d99fb3fd_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d5e30d8d3f3696fedcf03a89d99fb3fd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5e30d8d3f3696fedcf03a89d99fb3fd_JaffaCakes118.html
-
Size
69KB
-
MD5
d5e30d8d3f3696fedcf03a89d99fb3fd
-
SHA1
63c4bd9d99e9715ed6cedad57bc446870ca216cc
-
SHA256
7bc099f31f99ee546c46f8d5f562f3717b114cb622fb68f1aaa835807e5d89e0
-
SHA512
080369bf9d7b2cb31095c14f51ddde281185107dc8f92fd7b090a41304f8dd65ef60beaa18226bb429b3adaf87d2bca9933b1d6e474f4fab22095354f7df6485
-
SSDEEP
768:Ji7gcMiR3sI2PDDnX0g6sK6dl1dCoTyS1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:J3fLTzNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 532 msedge.exe 532 msedge.exe 864 identity_helper.exe 864 identity_helper.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe 532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 532 wrote to memory of 4696 532 msedge.exe 83 PID 532 wrote to memory of 4696 532 msedge.exe 83 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 4952 532 msedge.exe 84 PID 532 wrote to memory of 5072 532 msedge.exe 85 PID 532 wrote to memory of 5072 532 msedge.exe 85 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86 PID 532 wrote to memory of 1460 532 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5e30d8d3f3696fedcf03a89d99fb3fd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0x10c,0x7fff6cd046f8,0x7fff6cd04708,0x7fff6cd047182⤵PID:4696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17461182876022437553,1345177329817310341,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,17461182876022437553,1345177329817310341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,17461182876022437553,1345177329817310341,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17461182876022437553,1345177329817310341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17461182876022437553,1345177329817310341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17461182876022437553,1345177329817310341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,17461182876022437553,1345177329817310341,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17461182876022437553,1345177329817310341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17461182876022437553,1345177329817310341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4784 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17461182876022437553,1345177329817310341,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:4664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,17461182876022437553,1345177329817310341,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,17461182876022437553,1345177329817310341,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD5ca8af9d4e83148b3319da92f9c17b73b
SHA1b7ad1f262a573977e4406a3c69e217b85efe267f
SHA2569ad7e53b7418c3da315a13862942a43e0c7545951d05c7b5c243e19bacbbfdf4
SHA5128b44d7c1433b75689bb4cb5658e97b0625dfe422a32d99776319c472ddbf98844b4558eb8c269ab20b9f0d488c002531365595063158c736876fff96b8bcc3c4
-
Filesize
6KB
MD5b4b4aaa5f34650af64b9ff3887228cd2
SHA1f045f255e75865072424a3f783bdada39380dcbe
SHA2564ac926aa9ee5ba1c9d8a704c63c8c79956f147fdf03c9ecf81a8d9bbcea3c5da
SHA512b0329b7104e9c713aac334ba395c77201fa0dc177ffcf4234a62f6bf9f35840227311ce5e345fbc3406a9ea9a15d29474581508f23275a2c4443950235a09397
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50aaf68c601c704a6ba78d34424424f62
SHA165430415445c5a05b90f6739347ccf97aa4e5419
SHA25610b3151cf8fb2c0a51565eeaa18ee3cb9a5f6a8bd83fbd4ee6c7c06dbdab98db
SHA512c8c2e7aed0017045833bb3a9df4b3eb0f91a519e90fce2eeeea71ee34a6e26e3aef59cd1b0ee1ffe20d00d3e0acdce4499c79aac76e0681eb0350309644ef758