Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 17:19
Static task
static1
Behavioral task
behavioral1
Sample
dad85dd31413566337981b0188391f47_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dad85dd31413566337981b0188391f47_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dad85dd31413566337981b0188391f47_JaffaCakes118.html
-
Size
9KB
-
MD5
dad85dd31413566337981b0188391f47
-
SHA1
3c811cf441578d33cf28c902bc5f377dfbb5d90b
-
SHA256
4f883951a0933d4576473e535b7d32d4d03abdb29c89bdf9df7c01a4c15bfbfc
-
SHA512
242366a793d2d7d9e0f6c88253e1527c3972da01c3fbe81464f348f0517ec49dad55458076a87045eed57c00acbe9dd0f3a876dcd0c87ab308f65fb37293c26f
-
SSDEEP
192:SIrSHR6cQ5DqfEGiUs4h/x7kZsxE3FCIyiRIbpGmnRhunLR12xbt2JF:SIrSHR6ckDO7kZt1ChiRIpGm214IJF
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4536 msedge.exe 4536 msedge.exe 2096 msedge.exe 2096 msedge.exe 1456 identity_helper.exe 1456 identity_helper.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe 2096 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 3940 2096 msedge.exe 83 PID 2096 wrote to memory of 3940 2096 msedge.exe 83 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 832 2096 msedge.exe 84 PID 2096 wrote to memory of 4536 2096 msedge.exe 85 PID 2096 wrote to memory of 4536 2096 msedge.exe 85 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86 PID 2096 wrote to memory of 3596 2096 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dad85dd31413566337981b0188391f47_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0b8e46f8,0x7ffc0b8e4708,0x7ffc0b8e47182⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,15636663155027827507,16311164915166683402,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2036,15636663155027827507,16311164915166683402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2036,15636663155027827507,16311164915166683402,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15636663155027827507,16311164915166683402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15636663155027827507,16311164915166683402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,15636663155027827507,16311164915166683402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2036,15636663155027827507,16311164915166683402,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15636663155027827507,16311164915166683402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15636663155027827507,16311164915166683402,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15636663155027827507,16311164915166683402,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2036,15636663155027827507,16311164915166683402,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:3476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2036,15636663155027827507,16311164915166683402,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4632 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4696
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD5b547da45201f69027f896480c9d2b6cc
SHA1300868163dfd6ccae58614c11355d3991ff1c9ed
SHA2565dbee1cb97823402bc44e71f47d72528ddf3b485a3a7c83c512c1f2bd9748c26
SHA512edc4f87ce159a21e02e6c2b9582186527b8eca33e814b9d9515a0552ad3f652af7fb323a65d8372b82bdb69f269f1e662af41e1b41a91e0731cbcdb67b6f29ff
-
Filesize
6KB
MD587146bab963199220b5f50594887ae0f
SHA16bdb1003ab74e4c49dbf60502d960cee78515874
SHA25666b98f6158497f08a6f069d2db48de742b2d554433967c8cc2e9d453f43576da
SHA512e405cd22db046b768eb8aec29ba97ec4811189b5731a37e296ecc4d0204357e608a1114bb26288944173c1b9aec6d18270c1cfb404f678cc07240b9f111a1448
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55eade61e3a1690ffcccae89ea446ba96
SHA1b4946f5dc53150fad5af4f5bef57e446f29ba53d
SHA25620a9c67b90ea7565baf71c92fc94836e6b698415ccc232886bf74ef8b71d3b2f
SHA51253ae34833b123c71a37c9df696f1e3e75aced8f3ba1e32d27e9d883ca2e7be37b90454628104efea53bb36a8b8334674d344f07d73d34e4aa2e3f5d1b814ec7f