Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
d7188b01b3d2a642fa6a29897989165f_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d7188b01b3d2a642fa6a29897989165f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d7188b01b3d2a642fa6a29897989165f_JaffaCakes118.html
-
Size
37KB
-
MD5
d7188b01b3d2a642fa6a29897989165f
-
SHA1
40cb7dbda5ff30d513626b5e126e4a9d8bfa67a1
-
SHA256
fdece9a34c6ac00be10e68a844f5da0b445a6a51f579bd458f332af38c1d47a0
-
SHA512
7ba33b428e2d193cb24048487f8ff614a597737d66b6ad4ed128808a10fa19a84cfc1a1b08159510ad72b4ffba0e56ae5580817922ee4eb2883beb0e2fe037a3
-
SSDEEP
768:vv/bVFRFQW81D4RA+vEOjz6rdG2Gil54RZfPGnf3Gu34aoi6781DdRA4vEOjq6hb:PRFQW81D4RA+vEOjz6raA7IafC81DdRv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 2856 msedge.exe 2856 msedge.exe 5028 identity_helper.exe 5028 identity_helper.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe 3456 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2856 wrote to memory of 3312 2856 msedge.exe 85 PID 2856 wrote to memory of 3312 2856 msedge.exe 85 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 3340 2856 msedge.exe 86 PID 2856 wrote to memory of 4384 2856 msedge.exe 87 PID 2856 wrote to memory of 4384 2856 msedge.exe 87 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88 PID 2856 wrote to memory of 4536 2856 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d7188b01b3d2a642fa6a29897989165f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72da46f8,0x7ffe72da4708,0x7ffe72da47182⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,6902395779476978494,5142753670243958948,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2236,6902395779476978494,5142753670243958948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2236,6902395779476978494,5142753670243958948,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2636 /prefetch:82⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,6902395779476978494,5142753670243958948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,6902395779476978494,5142753670243958948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,6902395779476978494,5142753670243958948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2236,6902395779476978494,5142753670243958948,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5264 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,6902395779476978494,5142753670243958948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5260 /prefetch:12⤵PID:2844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,6902395779476978494,5142753670243958948,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5084 /prefetch:12⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,6902395779476978494,5142753670243958948,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4128 /prefetch:12⤵PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2236,6902395779476978494,5142753670243958948,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4684 /prefetch:12⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2236,6902395779476978494,5142753670243958948,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3456
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:636
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\173ef1de-961a-41dd-b204-3ddb0dca5d12.tmp
Filesize6KB
MD5621cfe8d56bf2699e1d3b41f36c61630
SHA15fc545d7db88178e353f4d470209cd1dce1a2f63
SHA25608c358bb68c0b5b94ff94659e0f1f38f37f8ea2fdf5a529ab31f483ae8af9f87
SHA512de287ec1c47a783c080edfae108db2e54a8de91626d8d53946e90369d20d34bfdb6770febc4b283ecd32394596759750ba8304c76ac207420c372fa83eec7e7b
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5d137525763776d137d421acf2dd4c9b1
SHA18a6eb0321e3edc24b844bac6b8b71463c609ad0c
SHA256b475cb46b5094ae4ca3c90d76351de557b1824152c0703714d50f354d2ee77ea
SHA5125d18d906ae925569a37f9c2e2d9c2acc1018a7487e24b36c2885464d0d64ba00c8d504660dbe1df8716ea5e86ded42f2b666d065e004d741543361d915b797cf
-
Filesize
6KB
MD5153dc3441353399b1c6ad0b995072ddd
SHA117d8db2cd7b567425f50ca1064492a9c8de03e36
SHA2569c9a33fe1d8c2571cb99a0d0b67ccc9a8fc799c11716d8bae2d55282a6fa9906
SHA512e53c78d536ff935f1ff8a457deae89b7e22ef78b61aff9525f409a77e8713cdaa5a822292272e155959046f5a71ae4b96778a2c487ea866b803f73ea878bcafd
-
Filesize
6KB
MD57f51aaf2a9adc256ffd67816c243aab5
SHA16510294bb4f4c3fad21244d9d1543ef468effb70
SHA256b458738be773791e433f6101d2a94203e5fed878e0ce9222956c9af3cc648c3b
SHA512818ee8a876f39bffd99b9136e17ac71f38f6af44ba1a7724d1f276b5a8d0771ee4259335d233886e12bbdca255f8faaf1a842cc645e52efeb61c1a37d96fce90
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\a2701008-ffc5-4ced-8dde-6765f6cd9e7e.tmp
Filesize724B
MD56bfdb2b094393420411ffa6e1889fc42
SHA1daff5e01a60c754c47ef66ce539af5f391f81b71
SHA2563465e60679bdb257ee1fb6f6baab8ef57a70505eeddeb90b93bf94f0454b56fb
SHA51256aaddae4cd2e4333c6beaa7c64104574a24eb4c0671220e30e9d12aac4b3e300e18dd754beb8817f1edb98059559b54c952030a58f0c6bda6bfe4c6c54117a3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f5ca0605ae30623b9ad946f3699deaac
SHA145a25684b8389234287431fab2444905b718a773
SHA25630722084d9ff9c1c43f3e017c444d8b94e0a3486fc9294bfee6d5e962540639e
SHA51258058963fc1fe9388eb23a366b944bbc50e4e8aad8235dfd8ca1f6f3a338b8b7708c50e0fb4c4f5c8a3a411cf74e116e754d2dcddc64a5cc415962e1c33c3b7b