Analysis
-
max time kernel
142s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
d670f1dc9a78a9f2e4f8d65728bb4a78_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d670f1dc9a78a9f2e4f8d65728bb4a78_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d670f1dc9a78a9f2e4f8d65728bb4a78_JaffaCakes118.html
-
Size
344KB
-
MD5
d670f1dc9a78a9f2e4f8d65728bb4a78
-
SHA1
3f2aa30ba836b9041d12d1fb6fe2cb2769bbf26f
-
SHA256
522e6d1dcb363883e6cd562f6ab867b1d9524e8ef38d675d6a89e80b3aa32c19
-
SHA512
c10a0da5a8c8fb7af65c9a80258509f3f0b7038364725a7219327b6cbe2896cfd0aec684af5ffe8d203ec5a495a691b831b591cf646c63f70eac935b6f09d1a9
-
SSDEEP
6144:SvsMYod+X3oI+YHsMYod+X3oI+YdsMYod+X3oI+YQ:M5d+X355d+X3j5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2836 msedge.exe 2836 msedge.exe 4700 msedge.exe 4700 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 992 msedge.exe 4732 identity_helper.exe 4732 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4700 wrote to memory of 3768 4700 msedge.exe 83 PID 4700 wrote to memory of 3768 4700 msedge.exe 83 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 3324 4700 msedge.exe 84 PID 4700 wrote to memory of 2836 4700 msedge.exe 85 PID 4700 wrote to memory of 2836 4700 msedge.exe 85 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86 PID 4700 wrote to memory of 4908 4700 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d670f1dc9a78a9f2e4f8d65728bb4a78_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffee21a46f8,0x7ffee21a4708,0x7ffee21a47182⤵PID:3768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8959082519570812586,5500068526788744296,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,8959082519570812586,5500068526788744296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,8959082519570812586,5500068526788744296,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8959082519570812586,5500068526788744296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8959082519570812586,5500068526788744296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,8959082519570812586,5500068526788744296,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8959082519570812586,5500068526788744296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3028 /prefetch:82⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,8959082519570812586,5500068526788744296,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8959082519570812586,5500068526788744296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3968 /prefetch:12⤵PID:476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8959082519570812586,5500068526788744296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4576 /prefetch:12⤵PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8959082519570812586,5500068526788744296,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:3792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,8959082519570812586,5500068526788744296,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3408 /prefetch:12⤵PID:3340
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
183B
MD56b8e56d12e702b21a8ff8be007174c4f
SHA1fad32f644c24c905052ec84320220390ade4f1de
SHA2568329dcd7ca42ee73a0a780555723da2b34a9fe01d240c0e2a511dd7872f172a0
SHA51209ae2887f527359111dc8dda1fa16dcb47afb2cf7a28027b2fbc6ee75e0c3346e15b7d50c3a67ad2aa67c5ceb7aa46373209f606675ccaf7c4b8d741e6aab99f
-
Filesize
183B
MD5a28fc8c7b408c9fec7eb29ba72319a1a
SHA12b1815d04fb077e076a7c078db984304b82cf50e
SHA2561d26a34f3b686ef9b0f4402fd77dbbf4e517c3a60d31f19751f038953abe9e65
SHA5126a6f10e0011b2e2f335d65b2b5da07e47e06aa5eeb22ac8950f63928c18242952d216526c8a2ba909ad04fdaf073215c4277272c6de2a28c7cb39a211f0a78bb
-
Filesize
6KB
MD5267009ae4476524fed27849a5e06feeb
SHA1c1e7066bddf7a325d5fd7115a5521d3aaf8df85b
SHA2566239e5ce8d5af6374b64ba63804f01d8488bf1a11340771a950d110b0398585c
SHA51228adf6fffde02cbea2f27da676ad82bd91b700c7f4ff5195b6c6c111fc1120bcd2ee42ac93c4643693333ecc03227181bd5fea2d22bb663202e7baa373126591
-
Filesize
5KB
MD5adac36845a6afaab2fda3a71e6cc3723
SHA1ea1b44b7a5b942697e7bfa73ebfa8dd5e354041f
SHA256705d7ec3cdeeb01a6198a59d346139ab31c5e093d7ad116fadbf6a8804c4072e
SHA512da7a6dfed0cb3299e79f9a5df99d589f312be4b1c465601aa0f5a7f164167dc99563acdc1af6c1225fa220b91b65fce0151059d04a77acb07f31b074fc2b71e1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD570424d3b83235422dc781f036523d784
SHA11d8ce62690e011364bddac670e1c07870afd73fa
SHA25607d5876cfb1cf2ad8a81a70bf8d4b2864deebeab303b4c0b3e475a982fa31325
SHA512355efcdfbc631e635edad6ee4772f7db2ea4e3cc3ecc7315a0171ae2513f5b4cd4b0688d4386246a5c8e135d29ddcb322fda048cef32575f9952ae8d06d8d959