Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 07:50
Static task
static1
Behavioral task
behavioral1
Sample
d5e657f31f749090bd7f66a054dbb113_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d5e657f31f749090bd7f66a054dbb113_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d5e657f31f749090bd7f66a054dbb113_JaffaCakes118.html
-
Size
204B
-
MD5
d5e657f31f749090bd7f66a054dbb113
-
SHA1
858af8ffef5e8d480d52753be0c3e8cd51d1cb4c
-
SHA256
030061013e0ecfe9e3e641e23008863af4496d4ef7c1f3df20f97fba48fe0c5c
-
SHA512
5cf6fe183dd85c43ab35526166aeec7a6134145045773c6666f45d79b1401f3094df0491f969d3f7868d5f94dc0bd3bf3812af30079e7fa6182fff9b74b1f4d4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2636 msedge.exe 2636 msedge.exe 1924 msedge.exe 1924 msedge.exe 2688 identity_helper.exe 2688 identity_helper.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe 3652 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe 1924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 4700 1924 msedge.exe 85 PID 1924 wrote to memory of 4700 1924 msedge.exe 85 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2788 1924 msedge.exe 86 PID 1924 wrote to memory of 2636 1924 msedge.exe 87 PID 1924 wrote to memory of 2636 1924 msedge.exe 87 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88 PID 1924 wrote to memory of 1940 1924 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d5e657f31f749090bd7f66a054dbb113_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9afe246f8,0x7ff9afe24708,0x7ff9afe247182⤵PID:4700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9839016405388316195,8656464354184440912,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,9839016405388316195,8656464354184440912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,9839016405388316195,8656464354184440912,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9839016405388316195,8656464354184440912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9839016405388316195,8656464354184440912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9839016405388316195,8656464354184440912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3992 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9839016405388316195,8656464354184440912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,9839016405388316195,8656464354184440912,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5192 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9839016405388316195,8656464354184440912,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3544 /prefetch:12⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9839016405388316195,8656464354184440912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3484 /prefetch:12⤵PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,9839016405388316195,8656464354184440912,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4340 /prefetch:12⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,9839016405388316195,8656464354184440912,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3652
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3588
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD5c5f3d71bd87c6cb37da955572a72a844
SHA1e6ab779aa5e85218180efcbda1a44c12625f4bb9
SHA2560febd2e672f457f1b321fa3fbba28a4091f37d5d94a506cbed2d3b8be70ba3ae
SHA51238aad8211239fe9a996f7daac0a74f1f46809c09bbbe88905e4b11c92f7d952bc2c2980843a3e4e10715071cf2b19b7e73f5915d0c5d9e1dc9d829647143af79
-
Filesize
6KB
MD521dd9eb933dacfbec643072fa6559805
SHA196fe090e711291802498ff390769cfa3981522cd
SHA256721cd703d5bd3efd8449e38a4be89ed167884fb37148c04ef098feb1f6f10b9b
SHA51259e5d5b15eab479c1ddc8e80005a17e0b820d64dd7cb7a022650fffd9ea508f4fdef7828917273322ff995355b631d97015b5636b54d8065dab977be8dffcc22
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ca81c5416c5d4a65fd7a603f68489db9
SHA17094e55d5a18712943cff4dc3456052420cb9588
SHA256025725ef26f4f84f8e0cde0115c2ae324b2fb266a22a300d8217d327c3b53101
SHA5122c15e61780c4c48efe1119bf5fa23eacb953cab8565b39c3fe8d6f00b87bbef758857cff474efe8e61f9bd3d9877fa18a379a596d2dfd04ce99bf2c586bb0817