Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 07:40
Static task
static1
Behavioral task
behavioral1
Sample
d5e343bb402d8c6d2bd0ea3c394775ba_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d5e343bb402d8c6d2bd0ea3c394775ba_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5e343bb402d8c6d2bd0ea3c394775ba_JaffaCakes118.html
-
Size
29KB
-
MD5
d5e343bb402d8c6d2bd0ea3c394775ba
-
SHA1
fe70728af1b15e61e260f27fd6b9afcd9f3e695e
-
SHA256
d17d82d540b25d82089e9821c1f62ce39b78687cd68d7a6747e9df98ad2dbdea
-
SHA512
cfaa506f3ba1fd61fe2069adf6cb2e71e52f8e51b28f75ae5c3d9fd5d0ddef4a3f4c7430fdbac28e4d291524722aa8c8c6402ea6d305d56319070229c709ea7f
-
SSDEEP
192:uWD+b5njnnQjxn5Q/qnQiepNnunQOkEnt6UnQTbntnQbwCNrADYtrNw1Ja9gAq95:dQ/IPYJa9aNvPz9Ood
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5116 msedge.exe 5116 msedge.exe 2860 msedge.exe 2860 msedge.exe 3780 identity_helper.exe 3780 identity_helper.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe 2388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe 2860 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2860 wrote to memory of 4928 2860 msedge.exe 83 PID 2860 wrote to memory of 4928 2860 msedge.exe 83 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 704 2860 msedge.exe 84 PID 2860 wrote to memory of 5116 2860 msedge.exe 85 PID 2860 wrote to memory of 5116 2860 msedge.exe 85 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86 PID 2860 wrote to memory of 3648 2860 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5e343bb402d8c6d2bd0ea3c394775ba_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe1c1646f8,0x7ffe1c164708,0x7ffe1c1647182⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,6317730119999793061,1277689485679861694,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,6317730119999793061,1277689485679861694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,6317730119999793061,1277689485679861694,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,6317730119999793061,1277689485679861694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,6317730119999793061,1277689485679861694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,6317730119999793061,1277689485679861694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 /prefetch:82⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,6317730119999793061,1277689485679861694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4136 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,6317730119999793061,1277689485679861694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,6317730119999793061,1277689485679861694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,6317730119999793061,1277689485679861694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,6317730119999793061,1277689485679861694,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,6317730119999793061,1277689485679861694,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD5ae0e2ff1a020b4791f62382c0bbfd8e4
SHA1324e8e698f0c3f0094bbb0c1b486bf2634d29e47
SHA256bcb59b27c9442cf8b2c16966a5c569ed71607aab208fbf655bd2e9286cae8b33
SHA512d332c85478263d1ffaf46318fbad399e0e19c4b5c2f132da95df10c7d86c34c24d38b62babfea2dff75f253d999091f41fac53fcfe1a0f1baf8431f1f5cc012d
-
Filesize
5KB
MD553a5a478dbf0a4e1e254ca1c274dcb3d
SHA1cfe98cbafd90d47cce4b465666d42cb474d75607
SHA256d646c9c949c6a29fb3432a77ad00de7cd82ce759de700bb7706ea82f02ee3b48
SHA51203faa753fc57e786d0643f95b147bb3c959fd93f8ed061d58ef7bfbd488b4b965707f2848b742650c822f0d2811021090776b003abe9f4a9f62786fae78c55c1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56eae18c31a33787f32225a852e88886e
SHA11239d441b928d97337ab343d19fb51fa9549d3ed
SHA256c56dd19bff28dfdb26ab4dd087a0dec696abb7e2dd894d3a81da4c8e4744537c
SHA512a7a5765f6c2bae4b59906ff10425850af2dbc465381a32012e0d2ba6f0f324201f97f21d0ff0ddf26508e05811e33c859b5fb47b47710cd870af570eef23aff0