Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
daaba832973366ce7f522770dac0642f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
daaba832973366ce7f522770dac0642f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
daaba832973366ce7f522770dac0642f_JaffaCakes118.html
-
Size
213KB
-
MD5
daaba832973366ce7f522770dac0642f
-
SHA1
ddabde2cf7cd82b99d83b0594877bed3ceaa0311
-
SHA256
fcfdfd04449dbf9070df3de868f7c7b0e06cbe1a9af69873c694146557f1e00c
-
SHA512
2e3d9bc4c01013651d8e38711aeddf5686f154410bedf9c54d796d5c903b24cac8fea846b49e25e46edd59823e5563b465d2626349740ff48da5c534c838e0b8
-
SSDEEP
3072:ScY+jfRe7zAsyfkMY+BES09JXAnyrZalI+YQ:ScXoARsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 956 msedge.exe 956 msedge.exe 4572 msedge.exe 4572 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe 2028 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe 4572 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4684 4572 msedge.exe 83 PID 4572 wrote to memory of 4684 4572 msedge.exe 83 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 1072 4572 msedge.exe 84 PID 4572 wrote to memory of 956 4572 msedge.exe 85 PID 4572 wrote to memory of 956 4572 msedge.exe 85 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86 PID 4572 wrote to memory of 4936 4572 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\daaba832973366ce7f522770dac0642f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff449b46f8,0x7fff449b4708,0x7fff449b47182⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,9847500118565442972,16770553745339199919,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,9847500118565442972,16770553745339199919,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,9847500118565442972,16770553745339199919,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9847500118565442972,16770553745339199919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,9847500118565442972,16770553745339199919,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,9847500118565442972,16770553745339199919,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2028
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
6KB
MD51d4ad00fa964f2a3529f36dfb58b1488
SHA125f63b3f47d442574183e7988558af47bb176449
SHA25662a895d4938fb8d21f701a80cfbd17012926d73a18118c2b41c10525a23e7831
SHA5129edccba8510cb213deea34f06676545cb73982f03c775f6c2799047f72645eead56d8d07fda1fd0cf6bf2e38d8af7ff38eca5189c22871bbde56aa2b43368793
-
Filesize
5KB
MD5e5b4c5355bf79eb078636cd5ed61abd6
SHA1e4e0e0416197213d0d5c9c6b31e36e25dfa6b9b2
SHA256153d590174904cbce2e7a48496c3bd25e9bd43ac0c53541d9f5022eac7a7c642
SHA512af23249029f041752c967141bbfa41e09b4741bbe02ad58fd9486662a6af31ed5a4aa993bb4f353342f5111999551f396d9a6e1a268e3ea4cafdc5537a4c9e3b
-
Filesize
10KB
MD59b07772b7c389f2fa05779b853b443e8
SHA113fc5e51f02d1405ea76be4ed923ee8c9d53e037
SHA256cfab35cd4bb2dfbaac9b3876f1a34cbd8660be44385160d3367409d3f6275533
SHA512abdd9153e9ef2c043e730e84df8e407163bde4afb887b52e775c02d097174c56c0c50408bd48d1dbf517639a4a8190838ba6692b17a1dcf6e0ded0bdb1fc4e35