Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 21:28
Static task
static1
Behavioral task
behavioral1
Sample
dd15380f41fe37e1059b13717c588f2c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dd15380f41fe37e1059b13717c588f2c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dd15380f41fe37e1059b13717c588f2c_JaffaCakes118.html
-
Size
165KB
-
MD5
dd15380f41fe37e1059b13717c588f2c
-
SHA1
238fe646e87106697ef46f0b6ab2c649a5567e96
-
SHA256
d872646f3335db8645054b2f47f086e93bf56f297067c791a8d390fa91177733
-
SHA512
b279f93a359ab717932fe5962254f9a1eaf61e4c821677b7107c01bbb0e1308d4d28d4a5957f6fc41bf408abcba69429431888a3f290ca423000645f43d851c1
-
SSDEEP
3072:7wbmcAHHU3O5m7koFK5TafyoTHj8W9DomfGFjLt2jdpCIQKtWlkeNVMs8sMyKMpr:7wibYyMomfGFSpCKyhKm
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 892 msedge.exe 892 msedge.exe 212 msedge.exe 212 msedge.exe 3580 identity_helper.exe 3580 identity_helper.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe 3672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe 212 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 804 212 msedge.exe 83 PID 212 wrote to memory of 804 212 msedge.exe 83 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 3680 212 msedge.exe 84 PID 212 wrote to memory of 892 212 msedge.exe 85 PID 212 wrote to memory of 892 212 msedge.exe 85 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86 PID 212 wrote to memory of 1084 212 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dd15380f41fe37e1059b13717c588f2c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafe8546f8,0x7ffafe854708,0x7ffafe8547182⤵PID:804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:1084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4732 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:1068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6224 /prefetch:82⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4716 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16534872122253426186,17740040177726681081,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:956
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5b4779a12c81bcba576b8e976b5ff337a
SHA107c9b484c121cab2fe1017d9f7f72b769512dfc5
SHA25614ef98a55ac60aaae076fec7397ffc37d8f99a2ed626443f1b2d9aefb678dd5b
SHA51285afb909f44003f1465e17d7000aa4ab211d46a4dab9d9103a749836229c37d065220a704ff1bbf3d6e3f547a678fd8807e82794b3806d947c7adc1d5360e207
-
Filesize
1KB
MD5dcc4309852b652740b5e0a43d7cf93f8
SHA10a10ca892db2065619eb0896b2bc56af650268ae
SHA256ae4a92576c182c01fd196e291a594f1e1cd29cdd1911f4e4d1dbe1b93dd65ae1
SHA512243e468718247aa5292100346fb11b59b7738fe8b5e42202e8f58e448ac9a18b303e69b7d7fdb65980dc0c15145877fdbbe0dfe25a66c347b04385e68c714c7d
-
Filesize
5KB
MD56a9bb287b12ddf1be43769b3034eabd8
SHA1cfb71b0c5361860b650e916189d845290f0d5bbf
SHA256ae54f527606aae0d33fd63faf6efe5ecb22f2acdfbdca5f78ad7ff948f8dfaf4
SHA512ee21a946b08e1bb62306d2eeda99ab839dddd9435815c3f8a76b7818b95cea294a1b5ad034b438256c5ef6951361f8bdcf97d194df8bef044d251da43b23aec1
-
Filesize
6KB
MD517a0532cc849f424b0ceccddcad353f2
SHA1c1316daf5cb509d3d7d1f712d55326ee91fe903d
SHA256a4e8d6689d322f49a448d2a65f1a7986cc5fcf03f245bcd6a1e94997edc3e0e7
SHA51247ddc50b2ceed42f2885d5bebb4a4dad41378289bed4a8beeebfb9a7bca567f6b1d2b57486c6166b3dc3ff8f1f95a35355ae6a40211d64db666efe23030660fc
-
Filesize
6KB
MD50d9764fb6997335e35959affa33683c8
SHA19298ea8e106ccbd8d4d5d4ecc47d9c092d012dda
SHA256fe922b437a056d11091bea34ba734514c8126779dab803f26d2c07a14880c358
SHA512d46d1030914fbffabe1b216da94064e251f8d8f0686d71d1a6670ad74a5ce66c46b2ee1e5127d00845a18c6d7e215bf898da93d0c35be6394f1352deeab5e454
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5ea11eac751a5f63da8f55c5db2f8accd
SHA182b59d53a6532e99c93e15281c191d20e71a3356
SHA2561cfeafabdb23e2bd82b33c9db2843ba361153153811bfbff4c9246890337cc85
SHA512aff28c68ed48475f1215fc4a06fb699df4788f4f7d5eecd95b63cda85ecc30ff3dfca8cc54ac3f5b95cfa44cc0b8d86e2344ca246b06bca43a9b025102643739