Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 15:16
Static task
static1
Behavioral task
behavioral1
Sample
daa1d9835828307540f52f103ea69fbe_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
daa1d9835828307540f52f103ea69fbe_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
daa1d9835828307540f52f103ea69fbe_JaffaCakes118.html
-
Size
139KB
-
MD5
daa1d9835828307540f52f103ea69fbe
-
SHA1
1262ce99040db3c3b252d76b0084f2fb93a1e36a
-
SHA256
aeedda00fab05ffaf5561aeac9cb9c28cb0171cddefba7bf3b2045bd8494c2b8
-
SHA512
a06f7aa384fc868e65a1f5ab365d96c3fddfb8ddc7b6c13f916005d197a625bd7c0a58434e419615f77dc4ce7332e9ac7404d1d5305ae9770eac0fd017ea2a7d
-
SSDEEP
1536:Se1Kn3lUtyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOZ:Se1yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 400 msedge.exe 400 msedge.exe 4784 msedge.exe 4784 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe 4864 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4348 4784 msedge.exe 83 PID 4784 wrote to memory of 4348 4784 msedge.exe 83 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 84 PID 4784 wrote to memory of 400 4784 msedge.exe 85 PID 4784 wrote to memory of 400 4784 msedge.exe 85 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86 PID 4784 wrote to memory of 2056 4784 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\daa1d9835828307540f52f103ea69fbe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8b5d46f8,0x7ffa8b5d4708,0x7ffa8b5d47182⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,3103857459396999668,16420962476175382187,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,3103857459396999668,16420962476175382187,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,3103857459396999668,16420962476175382187,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3103857459396999668,16420962476175382187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,3103857459396999668,16420962476175382187,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,3103857459396999668,16420962476175382187,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4864
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD541e4c9f87b95dd5a1b6d9f474ae91174
SHA17c9db2fd759a9d334458fdc701b52095cf3ca8c6
SHA256e9e93be435341347e7457fa776b24af2245468ceb7d2dac91689a080913796a5
SHA512cf2dc2b0912e6c667d3d075e0a17fd6e845607793797e2ba6290f4cd97d6f6a29aea774bd0179a6a1b2eabb77f4835d0de85e7066782ae63e89174d5dec912c3
-
Filesize
6KB
MD517f1fe069b7d4fc7fd9cdd0acddda37b
SHA1ebb8ea7dc47bb5520a92125203cf7a2fdf512c01
SHA256852b853ef8cd335b0de29c6e48f1ef7dc3f63752bb8753bf69f1eb6870b74da7
SHA51224877a92ffafe39196ff2f226fee1316ae966abce3fd78adfbe244be25966e9c00cdb08384bed6ab2313410d0e3c9725198087dab85c3938aa1697de8cb38adf
-
Filesize
10KB
MD521bc96f11a4f3edb6497976ee544ac3c
SHA148a634fe0d1b1d6308c8e433ced3bd8bde56902d
SHA25613360d0428047caf234fa40bc70e9b8162a4279f49324b5da28d0c8f457c2c3e
SHA51260fb1fc05f0de8a2ba9304d95338a64c5da2e841f10e89256311aceabdce91d9b5d1b6b55f0f62533cc61e48bef0af0347a38914fc92e1754ff43675fb69810c