Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 18:18
Static task
static1
Behavioral task
behavioral1
Sample
d6db9f8f91e13e3f4c0f3d4ddcb98c41_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d6db9f8f91e13e3f4c0f3d4ddcb98c41_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d6db9f8f91e13e3f4c0f3d4ddcb98c41_JaffaCakes118.html
-
Size
4KB
-
MD5
d6db9f8f91e13e3f4c0f3d4ddcb98c41
-
SHA1
a62347ea6ca513333060eb740f2ad4ec4711ddaf
-
SHA256
88e16f1aeb78a6d4a5ba72b56d4593ade216ff5663e4f064f59626e169a945e3
-
SHA512
71fa661254a56b3a7506276033987c083878d677436f72572c33af989b0fe81f2c59d9379ded4bf367b8d444730cfe1b52d15285853d947e7d74553b5773eb68
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8ohyd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2032 msedge.exe 2032 msedge.exe 3948 msedge.exe 3948 msedge.exe 4292 identity_helper.exe 4292 identity_helper.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe 3948 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3948 wrote to memory of 3388 3948 msedge.exe 83 PID 3948 wrote to memory of 3388 3948 msedge.exe 83 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 4104 3948 msedge.exe 84 PID 3948 wrote to memory of 2032 3948 msedge.exe 85 PID 3948 wrote to memory of 2032 3948 msedge.exe 85 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86 PID 3948 wrote to memory of 3896 3948 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d6db9f8f91e13e3f4c0f3d4ddcb98c41_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81fe546f8,0x7ff81fe54708,0x7ff81fe547182⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,11418885398714869448,15063840712161332725,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2240 /prefetch:22⤵PID:4104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,11418885398714869448,15063840712161332725,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,11418885398714869448,15063840712161332725,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2540 /prefetch:82⤵PID:3896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,11418885398714869448,15063840712161332725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,11418885398714869448,15063840712161332725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,11418885398714869448,15063840712161332725,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2224,11418885398714869448,15063840712161332725,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,11418885398714869448,15063840712161332725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,11418885398714869448,15063840712161332725,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,11418885398714869448,15063840712161332725,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4016 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,11418885398714869448,15063840712161332725,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,11418885398714869448,15063840712161332725,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1048 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
292B
MD5b99d86fecd1fa39f5c2c1d4c3ac44305
SHA196167531580f375596c77b5e9ae219c6fe767b12
SHA256e0466a7f2e600c73c230426a2f6cc72a0131da322f71df345f6a9e7ccac856f4
SHA51296118617d8719557788f7e6bd938d5dbd2d7c13b8c8e5d9a0f412137cf0baf055f2fc04c98f67fd31b003a6f45e7dbad1797f7d78937db56e446941c95f307d7
-
Filesize
5KB
MD574d8c46b62918fecf5f6e28050bd0756
SHA1632ac93f3d8f81ebc4cc61d5c96b26c38870b2e4
SHA256660462948ba3baecc03f9484399595b685303a74e5ff7c8f2214c8718acc0d1c
SHA5127c987c210597a4153c8c957532f3d7d644ff1c632534df5e59b6d55c5970f0e680ccf1211d801ef916ac9a4757a8880b176ebd982f36a9896bcaf0fa3f708811
-
Filesize
6KB
MD5231fb1db38e1c52b48028289422c0a67
SHA1153ac36b9c76fb3e3b01f9675af5914db9586be8
SHA2566aa98945cd9e49115d904ff99de5a8739c68412e98f1206e0831172aae7fce91
SHA512ae7b4896af7fe97b45a764a4a6ec7a3a54af1c36186c002c1a353451dbd108bc571562c1bbcdcdf9af5e7a1ed9d27c32f5f952e8113bb7d83626635ac1a223a8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5e66309b9bb1f3458d07bf7e6ecdffbc5
SHA1c250e439944cd845973ed8ee7081203d3f4e4b90
SHA2567b78a07aa16de8e734ec013a1e29b078e83bd4c891a7b4213263c43162a8e2ca
SHA5129543f0ad6e2616c8dacb9797284ebfb0147be46eb36e745fa98f1e02ed1c21930b5c51a1800a31da58b0a36410f57ea04a003ff6fa464b1f99745a40f9c2ae30