Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 11:33
Static task
static1
Behavioral task
behavioral1
Sample
da41999f90f130109669580eb4546bbd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da41999f90f130109669580eb4546bbd_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da41999f90f130109669580eb4546bbd_JaffaCakes118.html
-
Size
62KB
-
MD5
da41999f90f130109669580eb4546bbd
-
SHA1
33c1a1a676a710d867de5ad5f6e7daa2f05272b6
-
SHA256
373af24b8fff72ffa2caf93601e8bb02bd5142873e08b66f4971b18faa873c90
-
SHA512
4787645a6f3d2b91a42a251ca4d2c4ee9403b3c9e1961595ab3d52f968c5fd5b5cd1d027d18a727fd19859f7800f1a68b7b4bb045267fc82b6233cce834c46f3
-
SSDEEP
768:Vr0eXBKCPKfu8n4wsQMBX+oz/PBwfiKC3XHuA6wfniDkm9UsEnVi2SlSS:lfKm8n4wszcoz/Z1vJGEnVvS
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2656 msedge.exe 2656 msedge.exe 116 msedge.exe 116 msedge.exe 4768 identity_helper.exe 4768 identity_helper.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe 116 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 116 wrote to memory of 5064 116 msedge.exe 83 PID 116 wrote to memory of 5064 116 msedge.exe 83 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 4488 116 msedge.exe 84 PID 116 wrote to memory of 2656 116 msedge.exe 85 PID 116 wrote to memory of 2656 116 msedge.exe 85 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86 PID 116 wrote to memory of 1488 116 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\da41999f90f130109669580eb4546bbd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbe2f46f8,0x7ffdbe2f4708,0x7ffdbe2f47182⤵PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4780 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵PID:4296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5408 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,3128389003884249683,15030767009364856885,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD512a30ae921e36e2279dfa3e3ea75991d
SHA1a16292a0911e007a737d07d4891b0c4a9b553218
SHA2563594ba1ed531cb2f0414ae884cf5d722af801bdb64ac6171161ecdb42fe25108
SHA512abe74323837b29858abd49e0aa5a7998b0aefa2956628a43520cda7d77cd6bc64bb17ad7107064229d762b94128e2a55e862c5e0403a43637e65b4ec7b641fc6
-
Filesize
1KB
MD5201ad14bc1eec0653cd88ff08e55d48d
SHA1d95f1bcd70f9eac7e4f7c25fafade57737acf29d
SHA2567a207ed59e38fa2460e9d15d1414339729c81080ef3347513b47aa6bd561c593
SHA512c9f38d97aa9a5195dfa02f0878fd3363d342ca6a4ac4247edd1cc85ec5942b0dd0c41704460bbaa708a27fe7d7f4c20d1199a45b610b484a40d7e68862c61dfd
-
Filesize
5KB
MD5f3152575c3df077d233186bdec0ea4e5
SHA1485bcd3ed285d1448a7cb39b555bdaa9a4dd857f
SHA256d8729b912faa20d4ecf1a97b533ff95db3658d8338b4467afd18121396de4b2f
SHA51219b265f6d3430ee33c2ad74b7841b47087b0a6bc91a78ef5de421bc6a69972b1b0dcb64e6f1f68ba1e7ec7424a8c50d756ec666f6777d7c5abb88871c3f7f957
-
Filesize
6KB
MD585c96ed2300feca9c9aa38ca06234225
SHA185571abc71ab0812f2ad4d7f3b3fe010f3bfbf3c
SHA2561cff0c7915941a512230b3c0eedc025462ac2cc7a9a6d80c3237627c964b239f
SHA512e4a667f830a6aa0cdab0d9d0714ac6957e87296923ad5c0651f1468a60d4b971cc0b1f708ebaaf3f221676f47463ee798493a8c3b82753fe059a99749ab2cda4
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5710509e059c8665509188d1f22947a84
SHA1a681fa26ba56384b3ef094a60eaab00766f75313
SHA2562d2695eb96b899cd2672b3fa3737c72c0354d95846e4d44370e5c6c0abdc872d
SHA51271c921680bb6155665854e2418fa4b5fa9476bdf65ce8057b5d04c0871859b7ed8d52c4e5383761af798c992d4b1eb69dc482ca84c915b1422c9d2dc522f6631