Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 14:24
Static task
static1
Behavioral task
behavioral1
Sample
d67fd93b0f680225eb5d388d5d6e0856_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d67fd93b0f680225eb5d388d5d6e0856_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d67fd93b0f680225eb5d388d5d6e0856_JaffaCakes118.html
-
Size
6KB
-
MD5
d67fd93b0f680225eb5d388d5d6e0856
-
SHA1
8271549e7c7d45ad1f566c4fd147e583a92318df
-
SHA256
434d9f24acfb19ac3182387944bec62343b7e49fcbfae2ce7dcbd50d2a91f282
-
SHA512
21ac327fff9150c16547b72036d9f7195b9fffb4179e9697337868a0902d94fd36bfb57275bf67f37fb039e7dcf3775b40e82dba7d0120eeb9e7cfbac7ef5361
-
SSDEEP
96:uzVs+ux7TaLLY1k9o84d12ef7CSTU8ZcEZ7ru7f:csz7TaAYS/zb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2328 msedge.exe 2328 msedge.exe 3336 msedge.exe 3336 msedge.exe 4328 identity_helper.exe 4328 identity_helper.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe 2640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe 3336 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3336 wrote to memory of 3752 3336 msedge.exe 83 PID 3336 wrote to memory of 3752 3336 msedge.exe 83 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 4416 3336 msedge.exe 84 PID 3336 wrote to memory of 2328 3336 msedge.exe 85 PID 3336 wrote to memory of 2328 3336 msedge.exe 85 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86 PID 3336 wrote to memory of 4424 3336 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d67fd93b0f680225eb5d388d5d6e0856_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffca8c646f8,0x7ffca8c64708,0x7ffca8c647182⤵PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9601875727779841909,6647840034174163485,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,9601875727779841909,6647840034174163485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,9601875727779841909,6647840034174163485,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9601875727779841909,6647840034174163485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9601875727779841909,6647840034174163485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,9601875727779841909,6647840034174163485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,9601875727779841909,6647840034174163485,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5116 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9601875727779841909,6647840034174163485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5192 /prefetch:12⤵PID:3760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9601875727779841909,6647840034174163485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9601875727779841909,6647840034174163485,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3920 /prefetch:12⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,9601875727779841909,6647840034174163485,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,9601875727779841909,6647840034174163485,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1892 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5014e74aa2009bfdb90de6f67fbd00a24
SHA14f24000578634b21ee056446094fde88330098e5
SHA2563dd4b5a1f00e6cc551fdc30ce552e7958d82000ca8398a3ac3c074dedb33e095
SHA5128cc710ea6a0e7ca426caf33517c761c9d84ac16b3d94223d135e2ab353cdc806b8b1289f268a4c2db867a8cc579659f3d355016e602f83084fd44a52ed51637e
-
Filesize
5KB
MD58319beb2716eb575bc4a6090993f1899
SHA1a5b63251a5bd1d38fc759ed873885d52772a1dc1
SHA2565fdb2f13fff77045b3b2e66f7bdeb051e9c3c56df09b706bbfd781240371c274
SHA5124406d4052cfb3c88038cefca124ed0aed4450aa4d14bbb72808d1a779749e1b60dbbe522a74a4f0d65d2eb38b6db74e4f33872e41b614a02d27de43ec77b1b01
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58adc5a7fe099abc6fad9f8cd8fd11cd9
SHA10bcb4ddc790c9bb319d9d31735b254ce4c621d50
SHA25682198fc463d41d892c21a7e837eb3edae79598eb533cd845ad9d1a205d37ab63
SHA51209c21c838eae9b7313913c9ca24011086985c8d0f07fb4a4dd6e88d2598201bf3aa5c3c719162d8ae38db32df04b3819f7e87be6f956c6f716cbcdc8e92895f9