Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 00:18
Static task
static1
Behavioral task
behavioral1
Sample
db7ab8eddf2337dcab2a78912b4253cf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db7ab8eddf2337dcab2a78912b4253cf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
db7ab8eddf2337dcab2a78912b4253cf_JaffaCakes118.html
-
Size
205KB
-
MD5
db7ab8eddf2337dcab2a78912b4253cf
-
SHA1
25c13781942a4f713fa5e4051cf03eeda8be0c70
-
SHA256
8cf117901f6e7d244cb8cd7454359a9900263f197cae2b281cb05beb2236bcb5
-
SHA512
19e6ce04fbd9f61bf12b76aaa496c6d7163bde269e6d1842d0b9c39c40002b8110216a267639c062a1f49b87184f2c0303119e07381bf109db71234aac05b88e
-
SSDEEP
3072:XAGs7eApBaoi2cyVQwQVF4ZDh3YUsezJ3a:XaPpBh3C
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4784 msedge.exe 4784 msedge.exe 4916 identity_helper.exe 4916 identity_helper.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe 4068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 4348 4784 msedge.exe 83 PID 4784 wrote to memory of 4348 4784 msedge.exe 83 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4740 4784 msedge.exe 84 PID 4784 wrote to memory of 4812 4784 msedge.exe 85 PID 4784 wrote to memory of 4812 4784 msedge.exe 85 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86 PID 4784 wrote to memory of 1608 4784 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\db7ab8eddf2337dcab2a78912b4253cf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa8b5d46f8,0x7ffa8b5d4708,0x7ffa8b5d47182⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3184 /prefetch:12⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:2240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2676 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5108 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:3016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1704 /prefetch:12⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2028 /prefetch:12⤵PID:1872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,16279139233292360557,3248163061433857639,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
1KB
MD53ef83e966161a924c48cfef1a93e6c99
SHA1270803c56ec71d38f06f196ad6f8cd82c656f8ef
SHA2566540c5a7c8affcf26e020b546deeef902257ceb7d635f7d5a4bf27454ec1ae83
SHA512ad904da4b2240270f738f4109953e105c40fa3a55a72e5c6b3651576e9eb45faad23c263bfd945f3fe109854d9a356e9b600b11fd32d6011184b3ae6564edd27
-
Filesize
5KB
MD5089af4cf06c77c92cef180f02e683b9e
SHA15098722d9ba83bfa86fe0da09f5f72d0b3c9984c
SHA2563b5bb1040f8f74a381647390aa3281c193d814ad766679afd7c91a39f2a0e479
SHA5124537460e8150ce9d7af47bf69a22c0b2f2f99dd5ff4dadb65e048b387ed97c25f812ba938e0246b498633720f02ba368ce915411fbb854aad45c9fe4a3194a2f
-
Filesize
6KB
MD58de338b3362a991448910b5cfb1f9876
SHA1a866b53ef83b3f8fb818864a0c7d0121c9c1328b
SHA256edb636669cd38825ec73a96f55bdfd40630f0467c715a20b2319f7c0a93dc0a7
SHA5120e91cf5cd5b888ab3b8d2103d87baa8d311cfc6accd8c7430bc587d9de6c01587d00a91a9f67b40ca6af9fb9c1e2525e20324c94c35189022557df0716aecbc1
-
Filesize
6KB
MD5ae23b69392fc711c6440bb88e9e816f8
SHA1f6d19b13967c0b3299fb09d021f0194058812d46
SHA256f56f5f7451e439e99600448bf505a51de88afb31f995c45731c905db68c450ca
SHA51240fb979ce4032561a176c1dd14b3531b0740977847c67cbd3d6acd6e5ab085ea38227bce0fee1c7811c7c91b54825b2e3fccd90fa0face3fbd33dfe0a2914401
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53616daf3180a2a0a48712f7bacaf55b9
SHA1c3a0d81c03a0f55911fda6c18499da4d605c5dc6
SHA256152f5ef06fbc78b8b28eae70ecab09f59e8dbda549c36c9bc0796f59cdfcfe4d
SHA512ccbc47bdeb7d2860f5219a9c83331d24a20bccd68015310c794b510a72d76cf1a09a37edc675fea86f80455db64719b7705d11c7d8364af7869d583f93558dc5