Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 17:30
Static task
static1
Behavioral task
behavioral1
Sample
d6cb18ac0894adc0af06d9d0ee104c67_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6cb18ac0894adc0af06d9d0ee104c67_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6cb18ac0894adc0af06d9d0ee104c67_JaffaCakes118.html
-
Size
18KB
-
MD5
d6cb18ac0894adc0af06d9d0ee104c67
-
SHA1
ac25049cb18665777184c087f722fbe112f3ea40
-
SHA256
8418800b953555fdd323a5be5d23825b0654c49e9f6ccf33bf74f14908c2716e
-
SHA512
37f01b629ec857142eb4b9e5813d40f6191f31eedbef55f4366a5b7fa9b856e3d056c50c0bad47d5d7f6b1665a018b952ff544d34ba00bc017f0617d9c4b24e7
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAoj49zUnjBhXZ82qDB8:SIMd0I5nvHDsvXyxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 2384 msedge.exe 2384 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe 220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe 1636 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1636 wrote to memory of 3948 1636 msedge.exe 83 PID 1636 wrote to memory of 3948 1636 msedge.exe 83 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 968 1636 msedge.exe 84 PID 1636 wrote to memory of 2384 1636 msedge.exe 85 PID 1636 wrote to memory of 2384 1636 msedge.exe 85 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86 PID 1636 wrote to memory of 2648 1636 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d6cb18ac0894adc0af06d9d0ee104c67_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd860746f8,0x7ffd86074708,0x7ffd860747182⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15895798164659597407,15080889433557657447,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,15895798164659597407,15080889433557657447,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,15895798164659597407,15080889433557657447,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15895798164659597407,15080889433557657447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,15895798164659597407,15080889433557657447,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,15895798164659597407,15080889433557657447,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1588 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD58f1e3179d61d41e55d724f1ff60a2599
SHA18f7a6a30aed754b8c50c29623af45171493de8cf
SHA25611f18d4e6ac4f48bb3aece3eb1f439350cbc067e937f6862aff3cfec8d6d2ee8
SHA5124f9f1d0174b136966b22e8834cced0dba137ba535922b6ec0f0c87c4125fe91ebbe23c78d0dc421764abe1c52276c589c2fe1281d6b2ec5b529c9bef9277f8f0
-
Filesize
6KB
MD52f2ebbe89f6a675558492f451db83249
SHA1eda53ec9e2e64234ef88287f644211b30c9c1597
SHA256815290c2414caa635b865f660312d8e17f66894e4aa1d73c67338dfd20680337
SHA5124a15f5c75ccea073a1041ed1ccd8187c10d241f6142a4dee7f9551551f3076d19517777a120e27179110805571d6d22b1cd5bee0ee0cdc66033513646546d836
-
Filesize
6KB
MD583db7625118c6a078abd786094fd3584
SHA1992f221745e89ca2708110de4824b2071489929c
SHA25647c420bc3c9116ad323e2190a8818ea625541e02f6242e68685f51eacbc09902
SHA51212c41fe9651d9b7dfbd38c7d38408a3b53648621003221e9e3ec89b718479d5ac3cf5195ba6913f45a0da80a3d4fac48be029f65233160c3cb841ab5e66ba62d
-
Filesize
10KB
MD5de5f3a355d039ec8a76cc531e5c25707
SHA13357f2b5a4ea07a8c70ceaa6ad239d25bbc7e1fc
SHA256352d80998fe8e121a9f900710af05f09b8abf5d43e5395110dbdc930e703cef6
SHA5125ca342a1aa1c444d0d0320a23a60eadc538f1eb9cd1c3272157e08425d7548a9c16f845715c5b5a758fcf39a88b23682508629416f31d50a9a759749dd9e74bb