Analysis
-
max time kernel
148s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
d9d826e4e9b498cc8e31e285f6dc5eec_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d9d826e4e9b498cc8e31e285f6dc5eec_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d9d826e4e9b498cc8e31e285f6dc5eec_JaffaCakes118.html
-
Size
467KB
-
MD5
d9d826e4e9b498cc8e31e285f6dc5eec
-
SHA1
6e6218478d2f30e62b0bc82b99edd4849770e110
-
SHA256
648011aacc039d1f373ffbe61a03dde7957ddbbb7ddf912db382fe59549041e4
-
SHA512
f07163582aaf039fa93e2f487bfd52ecade15ce8317a92446436054fc7efc137dbb68677426b4033964ccec6cfa43064aa3b415bbdfa7fd4c421dd33533c165b
-
SSDEEP
6144:IXc3UB1Vm52JVwZw97R0juPmPc9BX7kRx9ZhKIg/RGr/XzhxV+YC42Y7gr1Oad1N:Iq2Tekv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 3416 msedge.exe 3416 msedge.exe 1524 identity_helper.exe 1524 identity_helper.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe 4936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3416 wrote to memory of 5076 3416 msedge.exe 83 PID 3416 wrote to memory of 5076 3416 msedge.exe 83 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 2112 3416 msedge.exe 84 PID 3416 wrote to memory of 3428 3416 msedge.exe 85 PID 3416 wrote to memory of 3428 3416 msedge.exe 85 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86 PID 3416 wrote to memory of 1040 3416 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d9d826e4e9b498cc8e31e285f6dc5eec_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbda7c46f8,0x7ffbda7c4708,0x7ffbda7c47182⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:2112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2504 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2960 /prefetch:82⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4864 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,6514030432794968043,12635599148362827930,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5220 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d4829218222c8bedb9ffe89dffd37095
SHA1aae577f33f413ec3d09f2e7ff5d9cc20a602241c
SHA25649239b229a2519583ba5d6de3702480b8a8ebf3cfaa8945100dbab25fcb02b7b
SHA51203e26a2e3de41b8a829b5543da504c7d7ccdc4c112d629efcac24dcda23acb50a52b5b99572b5efb2a01cf392a457cf9fac85663b3d63f7606be00dba218f8f1
-
Filesize
152B
MD515e9c4b4eefb3e1c08a010e748e10f58
SHA13172378f2c7a00553ce086dbf53fcf3126c5a724
SHA25607b56a769467e8b57f9b7acd9d32da266ca5000803758c18bb6818ac236c7000
SHA512811058b539e914a812c88543bb6657de736f691d18d6dadb5e1f6ced286780fb334dc5f575babbcf4fd2dceda30d1bf4004b374c5775e7f278346b100b29eb7e
-
Filesize
849B
MD5f8c95bf746afca0d2ffe4a2767b737fc
SHA1b652e5350ec31b6fed4a7ebf4382998c4e3f9022
SHA256e09d275758f24a8e2453f21fb87dfe5c141fe1910efee77af47993d2dbc3ebfd
SHA512891d3de634c46e1cc53cc767c866216c820f6cdd21aac80139c696ff934ec5dcce77c5052e8c74c3746adccd097c8660e408c3b30bd2701454b790c3ce834dde
-
Filesize
5KB
MD51b87f007959e4676b7ef5b9ba6a85a2e
SHA1b6e3e22c5fa45ce22a0b7cc600d2de240009f6f0
SHA25698c669ca8460acdd04e610b8c266865cf0557211b3a37457eb1bdefe7621e67e
SHA512080ef950a0b5053c6744e6b934bf94e8a9791f011c35fd56001daf4bbb333bb9b05a33ab19446ede77f395389f9cd0922f3187f9fcbfbd7825674c08773e8356
-
Filesize
5KB
MD5a49a33d1ca5525ee7be6d8bbaafff0f8
SHA1b9d15cf2882fb9dec8682cef15e4702568dd21a9
SHA25689214f17ca524b75cd0202c316c53667438671495f886eecd891a1c35d5cec89
SHA512bf3189f2980ed4ab8068b3b6305419af7476e28c42a3632bbc37aece3b507932ef2d1e57269e26dc97905da1b7878c835fb943260fed968f3edcc69a8128bab0
-
Filesize
24KB
MD57915ba0545666aa5833cf9f9f86d45d6
SHA1743ecc319bc2a54973582d4a5198042a48fbe8db
SHA256f8fcc045da13bde0f5dec3ada86342105cbff34ebc2442bcf51e8ed509a95b20
SHA512a53036251a22cdc95579ea8641c5574f1dc1f7dfd0390f00ebeafbbea0c1a2c0c3e6dba23bbbb8d8e2c77a3e1e816ccfaf84a97da1c334019c8df1414999d1f9
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD535760180a6d1aeab55dd18cf506bd7f8
SHA1e58e739c1d1a4dd0bac2e8c0df32afe34dc72088
SHA2560d9beaf857e7025edc32f99623aed1f0e99f4643e6d4827f4e716a1842fb83d6
SHA5124ed0bd2a97a22f065399e65a9e09baab8aee50dd949ee2daaf8059c1211412caf4181d69ce2f2a9fc2e7a92572d6de6b0e0047758822ee3feb84a6d309b1c4dc