Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
d70afeb499c424f8307af96140e87e30_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d70afeb499c424f8307af96140e87e30_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d70afeb499c424f8307af96140e87e30_JaffaCakes118.html
-
Size
189KB
-
MD5
d70afeb499c424f8307af96140e87e30
-
SHA1
777ff2da1d22672aa7b3b9af768f8d48eb626245
-
SHA256
9d93bce0aed7d35caece7a18402eb2cd82d272747ead485ac390ac04f8f17696
-
SHA512
abf2dfabdbbf7826885f1a340d3c7984dcfde212d7153c3c8db59ab562b9cbecb6e3ad329ad7d7e5c5d6db0b4c296bde0b53fcd1bbc988e52f9d6aa654adafa9
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcow1HAaBbLccC5PtsQN87cZXu6MKp:sar9LEsm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3400 msedge.exe 3400 msedge.exe 3452 msedge.exe 3452 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe 1064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe 3452 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3452 wrote to memory of 4848 3452 msedge.exe 83 PID 3452 wrote to memory of 4848 3452 msedge.exe 83 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 4568 3452 msedge.exe 84 PID 3452 wrote to memory of 3400 3452 msedge.exe 85 PID 3452 wrote to memory of 3400 3452 msedge.exe 85 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86 PID 3452 wrote to memory of 1388 3452 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d70afeb499c424f8307af96140e87e30_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91c4a46f8,0x7ff91c4a4708,0x7ff91c4a47182⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,8133895825690475149,16371793345418222268,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,8133895825690475149,16371793345418222268,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,8133895825690475149,16371793345418222268,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8133895825690475149,16371793345418222268,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,8133895825690475149,16371793345418222268,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,8133895825690475149,16371793345418222268,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4736 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:996
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD541c3b90918a24a9b70a4cbd4109c54c2
SHA187bc95e45750d2aff29df2bbf211df64e8c967ff
SHA256e66d264cdf355f9a34f0d1142aaffca5198810490523202ee6eb5248e97bf370
SHA512fe20338b79c656601626629bf25d59c2e838dbbf90e7bd3a7895006e27372c87663a4523d7938757e7f141048e4802b92ac1a2b87ae7c4569f60c375e3b44c69
-
Filesize
6KB
MD5c6fd9597090336b9f3cd85d3fce79090
SHA19bf4d0924ae5326eb18852f08c56fb395ec6f3ec
SHA256b3b92f44d29f494d3439677a32aeb0384bb05652b4248a1110c9f7dbb4a8e624
SHA5127884eedc19f961b8708239ce67121c06b4a1cbf9b70347a3a6507a48aeee727213621b89085fd2e0ac84a80a1013786429cfa6ad5c2821aacf5f6b5cd19157b2
-
Filesize
10KB
MD505244c821920151c9dca22e057a1781a
SHA10aeb0becd56a1ae9c8d98cc600fe6967ab9544eb
SHA256131b18bbba4572a729c0c249c25d0b358f2f1cc78df3e1cc535ab0e5ced2b80f
SHA5120930af934a1068f84aedb35d854d9258c11608683c869f57d1bfe947db9545300a3ea14ae2252de340454516c941f8cb8e2f4f454cb9bce7eca1d3fe085bd2c5