Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 13:12
Static task
static1
Behavioral task
behavioral1
Sample
da6ae3868f85bd834e58cf9b016ae113_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
da6ae3868f85bd834e58cf9b016ae113_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
da6ae3868f85bd834e58cf9b016ae113_JaffaCakes118.html
-
Size
27KB
-
MD5
da6ae3868f85bd834e58cf9b016ae113
-
SHA1
b5ac0073ba786735657d22eea1ffaab22c8a1760
-
SHA256
157ef6e71750a205e1053cd3d91758f5be987d6a2f540d88a6d030223521a2e9
-
SHA512
f062e0b9e2edfb74504ae4c29759ca0f3e4297041366f28ef94a1189e049a1edb573691f65096e72102a3ff84294d3b0a772702369132c148cf0b01becd47024
-
SSDEEP
192:uwrAb5njSnQjxn5Q/CnQieJNngnQOkEnteAnQTbn9nQ9eR1m6ufblQl7MBpqnYns:OQ/mUPibkS34R
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 1804 msedge.exe 1804 msedge.exe 3012 identity_helper.exe 3012 identity_helper.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe 1100 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2104 1804 msedge.exe 83 PID 1804 wrote to memory of 2104 1804 msedge.exe 83 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 3388 1804 msedge.exe 84 PID 1804 wrote to memory of 4608 1804 msedge.exe 85 PID 1804 wrote to memory of 4608 1804 msedge.exe 85 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86 PID 1804 wrote to memory of 2228 1804 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\da6ae3868f85bd834e58cf9b016ae113_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa4b2446f8,0x7ffa4b244708,0x7ffa4b2447182⤵PID:2104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,3384468553882357680,5880825050897145026,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2024 /prefetch:22⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1960,3384468553882357680,5880825050897145026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2416 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1960,3384468553882357680,5880825050897145026,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3384468553882357680,5880825050897145026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3384468553882357680,5880825050897145026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,3384468553882357680,5880825050897145026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1960,3384468553882357680,5880825050897145026,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5280 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3384468553882357680,5880825050897145026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3384468553882357680,5880825050897145026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4824 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3384468553882357680,5880825050897145026,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1960,3384468553882357680,5880825050897145026,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1960,3384468553882357680,5880825050897145026,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1780 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1100
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3024
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5b29cfe39113f23da538902f3f08dd2cc
SHA1bac8fa1a7fc20a61f746de216ecb93c7631a6249
SHA25600b64bb4b7c6f2f50c313a918cc79807a5e51e16f8b7768a481a3f5bc2e477fc
SHA51237fffcfa8bb1966e696d4832fd0a65dfcf4fe1cf7e1450943bf9ae517ce3c562ac46c1992a2e1ea45eae1556cb67c846562bc01f6fde360a1608c2a26d4b2dc6
-
Filesize
6KB
MD557f7a410f50148101af09d97d83fc0ab
SHA1c805093b0274a8a35ed168ccd5809c79bc568de9
SHA25698545957728b8c7df7f6517efeff2982ee1105bbbf473e09b328b0b06d628e58
SHA5129ef575935cd7f5ddc901577bd1b1d8361ff7a07cfc9fa4edf20cff37062d3fd4c66823e0f6dc3a165ef4f5c92f3e4a72e76e4bf1a67553dda1df21074118c10d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54ce437cde71cae71431dc009531804d3
SHA122cc71a500388a3874e0b8923ef32f608c475fc9
SHA256d13d903639151ffd39395156805a4d00a4626146dc5df4f617e64f580931f3a1
SHA512ac5e14b9d3f306c483ba04169c8ecb22d40a3bfff39898a102c66e9749f15021bbed3524317aa8af62ffadcfe736b49b5df60b6fc0364c15b7287eaa8c86e09f