Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
d6b69c5c378f459ec176d406991c9729_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d6b69c5c378f459ec176d406991c9729_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6b69c5c378f459ec176d406991c9729_JaffaCakes118.html
-
Size
46KB
-
MD5
d6b69c5c378f459ec176d406991c9729
-
SHA1
d9a46e19c1e273ccf2c3e594681fcf218bdb5f52
-
SHA256
68f7b05260239cf2e94e33f3dc195542f7dee3266b8a35b7f5a4c1244e8ebc7d
-
SHA512
b1cdf903dcf8a58f419ffff9437dd481595599d430ac5fca462b6191bd8ad6fb65646aab53f1d3b109087355c6ea1f2c9f237d966c42a91ee58191f0c716a76e
-
SSDEEP
768:ZQzWhoLcyA5y1LJW0XgLwSIuWJfeVXceksKvQR1RBh+jvg8Ttesc/wPX+IcIrq4o:ZQWjyA5y1LJW8gLwSIFfelGsKvQR1RBb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3772 msedge.exe 3772 msedge.exe 3216 msedge.exe 3216 msedge.exe 3340 identity_helper.exe 3340 identity_helper.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe 800 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe 3216 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3216 wrote to memory of 4928 3216 msedge.exe 83 PID 3216 wrote to memory of 4928 3216 msedge.exe 83 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 2668 3216 msedge.exe 84 PID 3216 wrote to memory of 3772 3216 msedge.exe 85 PID 3216 wrote to memory of 3772 3216 msedge.exe 85 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86 PID 3216 wrote to memory of 1272 3216 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d6b69c5c378f459ec176d406991c9729_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc100746f8,0x7ffc10074708,0x7ffc100747182⤵PID:4928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,18299240638228330685,5143646895546226153,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,18299240638228330685,5143646895546226153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2352 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,18299240638228330685,5143646895546226153,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,18299240638228330685,5143646895546226153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,18299240638228330685,5143646895546226153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,18299240638228330685,5143646895546226153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵PID:460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,18299240638228330685,5143646895546226153,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5276 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,18299240638228330685,5143646895546226153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:2516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,18299240638228330685,5143646895546226153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2184 /prefetch:12⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,18299240638228330685,5143646895546226153,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:3092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,18299240638228330685,5143646895546226153,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,18299240638228330685,5143646895546226153,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3428 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:800
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
254B
MD5e4bf34a80efd469e740e6e6233b1314d
SHA13e115945a293b315829b5962779600f8a1c9c506
SHA2567f621c8e8497e58f28fb615f773da26adfa119c6d420e6ded033e431e855435c
SHA512cbc31d097a8df4307fa182337a55039f4066736e4e2d652a5595c65af7b9ff424c44249797caa5b7c93a2f492d77d41a78dac8e1430b6a9867b28215db6a721f
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD5e815a1ab7bfd283a0794e33ad7979403
SHA1c4c91e5265169b5615de5e87e3a529a1c88c21a3
SHA25650d5aa6269bfad3347418768271f7329ec15651ce415c13c3ac26b6582083ae1
SHA51252fd11da3722ccc6bc5af50bba2731b65190b929a3ddee6967371573c3b4f4f08b88ea3cf4e03f51070005813670e4aa5910f4487abe740198d77d659ea01fd5
-
Filesize
6KB
MD51ffd0ca0d6cc1af4e365f0e1939fa526
SHA18141e31a12eadaff76ab1def61fe1293cb42416c
SHA256e2324d73a3460c5c5649eb75c4f2d3dea27e88978791e47f60fde7403c3022f5
SHA5122914525c3163863f6701528fafd2f7a6eb021e281d1085fafa51f187fe7d6ad75c5364a963f56d3262d4f6216f0f4e7a0950291f5a753e27d9c8be5ffec00096
-
Filesize
6KB
MD5b0a788f5adc6183763f5854228fad5a3
SHA12306e9bc30ab0b5c1cf2cbd6532b230e2036c6cc
SHA256057572ac126554c43b31a556f5fa9990f5839444771a998bfbbd2bab8ba504da
SHA5126f9b672b7ad9e6bcb114c9dc04c2f00121e329e2e6bb6942cde4eee6503bb08296dba2db31817f9dc08143f78b4db09e3f0dc8422785ee2fd5e416a44aacc281
-
Filesize
6KB
MD56ab88bee0d7acd7809e9f9861811d1b0
SHA17c41ec98ee91580d29074390229dce36d059a735
SHA25617be3dd79b9f93d37ab1af7f789ab392ed7db833948813a11a679a5951657096
SHA512654b6a9059b026eac953609196752b18b726bc1661874e165874bf562ec97306a1d83389ea703cc4ce13782292c2477c1c31a26abe87c67b6fb7b06fbf6d1215
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c208e0e8ed881159387494c69972257e
SHA1fb18314e2a02899e442bb4c4290a18972f678e9a
SHA25679771faf227625449925c36d574d9dadd60fec4d005aeef24e3ca1e71fde71ba
SHA512563f7fd1dfcf02bc6f63d21950f3d49106634244429d2bf6a22f56bdd40200a5b5069d384b9656907a92ccad755140dcd171a821073e825bd4e2fde5676ee766