Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 14:58
Static task
static1
Behavioral task
behavioral1
Sample
d68d3d42fd1807b1a369ca3ff7012374_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d68d3d42fd1807b1a369ca3ff7012374_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d68d3d42fd1807b1a369ca3ff7012374_JaffaCakes118.html
-
Size
22KB
-
MD5
d68d3d42fd1807b1a369ca3ff7012374
-
SHA1
c9fdb59c2c84d03b532c17ee8658f5a552c36ddd
-
SHA256
446bf23386c2736c128cdc1262b82ee0ca1457fa9f7dbe9e37a68e10c19f5fce
-
SHA512
c8f7f237277445b82d67d7c887d246fb29f1fa14a75a7f6117c19a9289c91366f52edd47cabc5b367ca7e2551f8e739474279850b2c1bb71473b6272031b0b66
-
SSDEEP
192:B2ZbKnPmnQjJn+JcnQ76nGqnQTInZ2nQF9KrA6aQl7MVnxnQ5RnonQV7nW12nQJN:SJOdkJByz
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4828 msedge.exe 4828 msedge.exe 4696 msedge.exe 4696 msedge.exe 1720 identity_helper.exe 1720 identity_helper.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe 4180 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe 4696 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4696 wrote to memory of 1204 4696 msedge.exe 83 PID 4696 wrote to memory of 1204 4696 msedge.exe 83 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 1436 4696 msedge.exe 84 PID 4696 wrote to memory of 4828 4696 msedge.exe 85 PID 4696 wrote to memory of 4828 4696 msedge.exe 85 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86 PID 4696 wrote to memory of 3836 4696 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d68d3d42fd1807b1a369ca3ff7012374_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91c4a46f8,0x7ff91c4a4708,0x7ff91c4a47182⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,16340744002201293393,13989568543828509549,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,16340744002201293393,13989568543828509549,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,16340744002201293393,13989568543828509549,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2776 /prefetch:82⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16340744002201293393,13989568543828509549,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16340744002201293393,13989568543828509549,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,16340744002201293393,13989568543828509549,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2176,16340744002201293393,13989568543828509549,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16340744002201293393,13989568543828509549,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16340744002201293393,13989568543828509549,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16340744002201293393,13989568543828509549,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4140 /prefetch:12⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,16340744002201293393,13989568543828509549,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,16340744002201293393,13989568543828509549,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4180
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:368
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
474B
MD53aac5b442b7366a7315680826c61b767
SHA1c89433c89df95367d4523eb8e92274f33f3198f5
SHA2564ceeee77a21631b5515ddad7426a3395e3296bc7ba2899927c9dc697c605e7f6
SHA512fcc2942dfb27ebf48944bf1869410719ac71c7799f703c8754dfed09c50cef7b4af8ec378b80c3c12834e6625da70e7f479c96d0343034b88fdf0af236d5ce39
-
Filesize
5KB
MD5a4cfb9db08335306ae9dc7177dbc88fb
SHA15ad14413cb5a8eb6d14e3d490a8d98fbaf2adc5a
SHA2562728f94553d6a7f6f9607f9a30e8a3c156908e78e27a4d707f679602657ca737
SHA512b6a7bf8e9abcd57ae50f5c23fbd72320a11805de8808b58d12c803989b1d8f8c59f7016c1a72c533afc9326c2e5cf962a86d70a809b7d6dd1ed9f4e3310b0298
-
Filesize
6KB
MD50ed5cb9f194383a9c296876468e9c33e
SHA13448a8f3dd8298a660c2d5a63950b9246b68bf45
SHA256c87874a841b4cf228b6d01a4bea031dbab6e21eb62f0263fb3b9e47ee9e1a0e8
SHA51257464e47dcd5604c63b19d68a576fe67f2e669b4b78ce103f65a8249eaa21de8a494fc2b9ab667053f23c16fbf8c200c0553412a2feb981774e29c43eab7107e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5925bd21354705aedc9fb50e937944dd0
SHA18d05a0db2a2f630e42693e664a462609b7dd03aa
SHA25677967c929dd2d58560c808a0fb56e533f669626f79943cbb7739ce9f7628d7f5
SHA512e57123206260889cddcc173235f9fe392c2f22531018c4ccb504f8cbc7a660d5d97d9989230b7f063255dcd0495d05a5245e93b53b14bb3a480a84047ead922c