Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
d707ab5701d5aa22c5ec24e66657b7a7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d707ab5701d5aa22c5ec24e66657b7a7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d707ab5701d5aa22c5ec24e66657b7a7_JaffaCakes118.html
-
Size
36KB
-
MD5
d707ab5701d5aa22c5ec24e66657b7a7
-
SHA1
22562c4ebeedfc6760d9dff6bb6e2248663b01fe
-
SHA256
d1305f800825b3770dbddd1478adf26218abd3c29d52d63ff6b2c1f676746db1
-
SHA512
77464735a1d6cddc2890cd8eb42c96b31d17ef39683372442c5773e23f73f39e3305e065e7bf6956d8f772f38a11333f587974b90a87b089c7c424a4e268f746
-
SSDEEP
768:zwx/MDTHuw88hARzcZPX7E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6Tsdr6f9U56lLRq:Q/fLbJxNVWufSM/s8kK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 3932 msedge.exe 3932 msedge.exe 5100 identity_helper.exe 5100 identity_helper.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe 788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe 5016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5016 wrote to memory of 2856 5016 msedge.exe 83 PID 5016 wrote to memory of 2856 5016 msedge.exe 83 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3948 5016 msedge.exe 84 PID 5016 wrote to memory of 3932 5016 msedge.exe 85 PID 5016 wrote to memory of 3932 5016 msedge.exe 85 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86 PID 5016 wrote to memory of 4060 5016 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d707ab5701d5aa22c5ec24e66657b7a7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9df2f46f8,0x7ff9df2f4708,0x7ff9df2f47182⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11940791808257426259,17605772545656810869,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,11940791808257426259,17605772545656810869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,11940791808257426259,17605772545656810869,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2432 /prefetch:82⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11940791808257426259,17605772545656810869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2976 /prefetch:12⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11940791808257426259,17605772545656810869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2984 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11940791808257426259,17605772545656810869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,11940791808257426259,17605772545656810869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5556 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11940791808257426259,17605772545656810869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11940791808257426259,17605772545656810869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11940791808257426259,17605772545656810869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3700 /prefetch:12⤵PID:2632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,11940791808257426259,17605772545656810869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,11940791808257426259,17605772545656810869,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1768 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2124
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
614B
MD5ad52f987bcf260f569c8c204107dfd87
SHA108ba2a59c31f70b8517e7c9351e96ae2c1efbb38
SHA2561f1ad7377c78fc1cbdca13ce221a5dbdea2a8e6f54353eaf8a4788f960839cd1
SHA51213450578c98da0e33c0a9eff9d1417fd0ecd2f19b4d794043d2b9f681f81e7af50d5f1ad406c65e4bfa32074a31eaaa1bc274f507e58846ce99692bf4b30077a
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD56105fff684f1835d011978f4b741526f
SHA1c0a6fea3fa23976175e0779f5bf43eaac6f5ce5c
SHA256ac518b43a69261a1d06251449967bd8e5bda6a850de35bde30d8a6cdc3fb554b
SHA5125605647e474936e29e1d37ba32691ccddf5b420b6fec42f02bc9a495db8998d111c6e0e28bc8d91f99987822d4c4d09d4d077fde7ca37b54fb8208c154b7fd54
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\cee052b6-9f13-4ab4-807a-4ad23e0a2c6f.tmp
Filesize6KB
MD58d4b5b54a5e03c9d92be370a4d2ef6ac
SHA1d66590d49cea1bbbe4a5cc997a325dd644e04ce9
SHA256b4b5ca9e0f8af14f7f5b6c6447e52581aee665730d042fd609fc327d5a7a3f4e
SHA5129f27be80d3b8073358695150e09773458d95999baa63a844e5085ab05c09f67313e47e34ffebee6f03d235abceec5b19774c2fabe05f06a24ceea6960569e9c9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d0fc973c45fc0c2b2916a03b4d6f1aad
SHA161bc7e974a9f9ba719d04181a3696d07941db6b5
SHA25676542e7bbfb6e047ed53a2617d3a34021c06240dd715adbfa5e82dff00b117d2
SHA512d4642850331645db076640697904437f025f81cc1a5aae73564f43cfb62f71483b0b1ebf99fdf207b1b26b3d3b54684cd2307243ad85f4ab73fc3feb84387c65