Analysis
-
max time kernel
145s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 21:08
Static task
static1
Behavioral task
behavioral1
Sample
db37dee5267d02a7791cef4291be697a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db37dee5267d02a7791cef4291be697a_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
db37dee5267d02a7791cef4291be697a_JaffaCakes118.html
-
Size
138KB
-
MD5
db37dee5267d02a7791cef4291be697a
-
SHA1
cd4482995d1997d1745566d1fa1f266b93658e4e
-
SHA256
1244bd2af6b2f704bb5770553076b1925136f293ec35da5eaa94c593240d2df6
-
SHA512
3370577383af3d355faf7be6a90eeed2042bba468fee56365ce7018b299a8869742de0f558f049ac7bca65be4b4d5ff1ba4240c6fa1f1151e4c86fc227e19509
-
SSDEEP
1536:Sfl7dhal3RlKyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SfDUmyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 4808 msedge.exe 4808 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe 4808 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4808 wrote to memory of 3936 4808 msedge.exe 80 PID 4808 wrote to memory of 3936 4808 msedge.exe 80 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 4760 4808 msedge.exe 81 PID 4808 wrote to memory of 2752 4808 msedge.exe 82 PID 4808 wrote to memory of 2752 4808 msedge.exe 82 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83 PID 4808 wrote to memory of 4804 4808 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\db37dee5267d02a7791cef4291be697a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e98546f8,0x7ff8e9854708,0x7ff8e98547182⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9136294031841245422,134150672894240974,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,9136294031841245422,134150672894240974,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,9136294031841245422,134150672894240974,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9136294031841245422,134150672894240974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,9136294031841245422,134150672894240974,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,9136294031841245422,134150672894240974,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2640 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4712
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
6KB
MD5c949e78cbb65a8fc0ce356bb4926b6e8
SHA10fad133275d79b771e7f750f1db29a4ea18854d7
SHA2564b5822d66d774089914fe1d88e6b3a4348ba8887a237b0aebc58c902b6e96169
SHA512623b4caa0f646a44839341488a5bb29cd17874dcf2b0e035af071a8e8adc9fadf29943ca51567badcf14edfe4ee0c11a7d958a86602a77124d9867a345efc606
-
Filesize
6KB
MD5d5277af6ee237cd3476b6738b4b15fdc
SHA1104b2d3798e616fff4bdda40a09be13b2060e14b
SHA2568b7051a0483f2f08fbb5089062b556c789810740fc34392b7cb8f06d52031205
SHA512fc94207b600c2df7d41d672f94899928bf79dc343a0d1fe917397e36d8410e57b6e7e9fe7fb31396cdf97952e2735a4a1b093b81f19833912a579e5e85ca1cf7
-
Filesize
10KB
MD56b335f7ada561e8412adc4a46277a967
SHA170284030813f26b70211ab104201ebb0b523bd63
SHA256ca113867d2cfaa5b86022032775452b011b2a78e4909295885a4ac0725d716e1
SHA512705b492dc6550cbfa6dd893873c5903e3cf08c4463ea1bb96478b01e2c92e891c0949f487f9bae1a92a44907c47629ec76252da55a163066f40fea9b91e0c89a