Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 22:09
Static task
static1
Behavioral task
behavioral1
Sample
db4e32afffff5ce4e99e34477f91e50e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db4e32afffff5ce4e99e34477f91e50e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db4e32afffff5ce4e99e34477f91e50e_JaffaCakes118.html
-
Size
35KB
-
MD5
db4e32afffff5ce4e99e34477f91e50e
-
SHA1
4f20e85234b68d309cbef49c16c4f6aeeae8c77e
-
SHA256
d3df2e04eeda0d99d9788cd2e7b06f5f0f0c6b7ec8cc213edc4b2ac523b6e069
-
SHA512
de17f8d3a3eae9286ad0893d39c14b03360a83c7541d9d135d61a9c8a9b66d8fa3f012b17802730ed4417fe565d77d3f4b114135d3531d71e74743c1dc494e9f
-
SSDEEP
768:zwx/MDTHV988hARRZPX4E1XnXrFLxNLlDNoPqkPTHlnkM3Gr6T5Sl6zBy6OxJy6g:Q/TbJxNV2u6SJ/+8fK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3176 msedge.exe 3176 msedge.exe 4440 msedge.exe 4440 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe 752 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4440 wrote to memory of 3272 4440 msedge.exe 85 PID 4440 wrote to memory of 3272 4440 msedge.exe 85 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3520 4440 msedge.exe 86 PID 4440 wrote to memory of 3176 4440 msedge.exe 87 PID 4440 wrote to memory of 3176 4440 msedge.exe 87 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88 PID 4440 wrote to memory of 4992 4440 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\db4e32afffff5ce4e99e34477f91e50e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8a1f46f8,0x7ffa8a1f4708,0x7ffa8a1f47182⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16933372350216387198,8330656281341103942,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,16933372350216387198,8330656281341103942,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,16933372350216387198,8330656281341103942,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16933372350216387198,8330656281341103942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,16933372350216387198,8330656281341103942,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,16933372350216387198,8330656281341103942,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:752
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:740
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
612B
MD5d4f136a95611c9016f81bed2be0dcf25
SHA146bb983b7661efa3d949e4d2defce61fe576cb8e
SHA2566d803b137201f7e48135eae9cbfdd2aad885358b81bb8aef5011c5637103f4d1
SHA5126681221587cf0adecbb886f4c14f23bd7defec86a81fd0ef14954a6ccac0db778f6167bcbaa4a83d30baa5747f7d8f25c5ca76284954dd71c29446bb280c8d8e
-
Filesize
6KB
MD593453eef6b80213fbec1d64d9d32710e
SHA16416f673b91e4363c28dd796a696a7ddc632af5f
SHA256f245a00b8e4b048cd295f9df1326a2cd5a7f1933e97d30532cf9735bc73dc83e
SHA512d324ab9e392aeea75215aeb8fbd4307c511cf95cda6b3db8766a87b3c22b4fcf72a2d24fc0893511d4b9159eb63a2843d98ef8e54764a8b98de96e91a1024144
-
Filesize
6KB
MD56dd89d238eda3048fd9311b11974d81b
SHA173410fae735884bbd357c568b3623dd361658034
SHA256fa63def23d16d4a9f29f080c3f043ce2f3ff6f803c4e0d5b42249c5cd8f82900
SHA5129a8135a1340fcf4618feb664ad27666a8d89124b90acbd4da34d5a33ef5a4364e9668364c34d6eb0ab62ad93c980beed367141ba398777a2623afffe3ff45ea5
-
Filesize
10KB
MD5355fb609c78bf0e638e76c3e3e34759f
SHA1ee41e89c6a03849c80fedbd2c22b2bde705737c0
SHA256853b1dd727b411925e7a33f2bf8d92d3e0f79eacbe44b9d5a3b351c74e845943
SHA512ce28cae3672b46ea60388857096641bf14ca31e0d51cb1c02c560420a68e3c3e23ce004fc555687537a297bda1d2c2068d724564248bfc293ad3659e3bef02e2