Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 10:49
Static task
static1
Behavioral task
behavioral1
Sample
da2de70b0aecc337b99660b6a2422dac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da2de70b0aecc337b99660b6a2422dac_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da2de70b0aecc337b99660b6a2422dac_JaffaCakes118.html
-
Size
34KB
-
MD5
da2de70b0aecc337b99660b6a2422dac
-
SHA1
d54bc1fedf52d401e4719271099950fe5dd03126
-
SHA256
c2570873d633efc594d289de7c4bb3711f1942157086bfd2e9f9500ba3fa333f
-
SHA512
cc2d2bd5e9dc18ea8e28a0189649e742481fe25f0a9d39c431d06d6047df3ac8b1fef72661f1e8abf94406b39d1a95c696723ac413910fcb8f9e8fa950e3223d
-
SSDEEP
768:r7EpFwSXe6eDewe7eIeygjI1FCJC3CNChCICrC/CvCPJExBq0Z24HLx8lF0Fn:rwpFwSuDqtClpjIXEWmyP84yiJ4q0Z20
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4136 msedge.exe 4136 msedge.exe 4612 msedge.exe 4612 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe 4612 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4612 wrote to memory of 4208 4612 msedge.exe 83 PID 4612 wrote to memory of 4208 4612 msedge.exe 83 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 1128 4612 msedge.exe 84 PID 4612 wrote to memory of 4136 4612 msedge.exe 85 PID 4612 wrote to memory of 4136 4612 msedge.exe 85 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86 PID 4612 wrote to memory of 740 4612 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\da2de70b0aecc337b99660b6a2422dac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe80f946f8,0x7ffe80f94708,0x7ffe80f947182⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,1681584529603907523,12297889604495804040,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,1681584529603907523,12297889604495804040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2468 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,1681584529603907523,12297889604495804040,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2576 /prefetch:82⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1681584529603907523,12297889604495804040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1681584529603907523,12297889604495804040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,1681584529603907523,12297889604495804040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2024,1681584529603907523,12297889604495804040,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5260 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1681584529603907523,12297889604495804040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1681584529603907523,12297889604495804040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1681584529603907523,12297889604495804040,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,1681584529603907523,12297889604495804040,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:12⤵PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,1681584529603907523,12297889604495804040,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
308B
MD579627469c2ebf8a9e5343718db51ddb6
SHA15c8f0acf093c06a27031bc38d7bd7b8db3c45c17
SHA25669546c9b035210189c6921fb5d2b445309fb68a9212db4f15a886ef457d1f708
SHA5127aed705154f2d178f6666375666e49830ae8e874edc453e8ffd8838ffdedfef5167f7d0956001597d4662ca0c3d92e683fb066ad541bd1d138451626057a506c
-
Filesize
5KB
MD5011669b8c93d6799aad2fe43f488ba79
SHA19f77c90212123503e573761588ebfbd1cec8865e
SHA2561f247090d113a59bbcfe666257b5de0db145ea7916021561c0720451f814e3c4
SHA5122631fbc55892d77eb34f4dfdf9f538ba4a9ce11720bde1306f5080c4675701072b78cdbdcc68bcd74111dd06d4d3fc17c05a2c90ecb9399487005578f673dc9f
-
Filesize
6KB
MD594f712c765be8b41e44a783b506d0ed9
SHA10d560e1e6fe131508b2c37c5400b99ac7a1f2aa7
SHA256a4554996cc03476ee14e2706c666c86c01ecd305100f4efa3d7dd9d59229887e
SHA512ff159164d77d83fecf30d8b4ed3a021d33566223226fb0d81f29fe7b32edafa44869710d764ba644d66a175d70682fa41e04ba869571e784bb4a132c3533b9fc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5da460ff2415d776855967b1d342e9df1
SHA11698d6ba7dcf80e8ea2a01163803201caa15bbc2
SHA25657d0343abb8238db2f1849f1b86ffc36f87059651a6ff3ac168ce0a49cbb7a1a
SHA5126fed73a96c8201906629f90f61e6622c7eceedd19e5d86b6329b1b9338ae23c26183981e7cccc9a4f2aed5fb619de90ae33f70aebd479bcde0df60c0cd325a23