Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 02:39
Static task
static1
Behavioral task
behavioral1
Sample
dbaaa7a4d059d9ac1dde28d80410f541_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbaaa7a4d059d9ac1dde28d80410f541_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbaaa7a4d059d9ac1dde28d80410f541_JaffaCakes118.html
-
Size
36KB
-
MD5
dbaaa7a4d059d9ac1dde28d80410f541
-
SHA1
705e087a2becf9a5b5e60f6f5664d9c9d262eb2f
-
SHA256
744a385653480c37bc059dc40543af84e3469c1188bd90b93c0d98b69023b632
-
SHA512
6889e027800a2a75811dfac5e100697389a74af6b0cd6c25feaaaa9f0966c7109fd31f578bb93439484c3a0ccf5595b3eedee91ae6a8f4421b7e4a2e5c9ca4f9
-
SSDEEP
768:zwx/MDTHT788hAR4ZPXLE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6T0ZOT6u3l56lLRZ:Q//bJxNVTuhSi/p8qK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4384 msedge.exe 4384 msedge.exe 4772 msedge.exe 4772 msedge.exe 4316 identity_helper.exe 4316 identity_helper.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe 408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe 4772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4640 4772 msedge.exe 83 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4028 4772 msedge.exe 84 PID 4772 wrote to memory of 4384 4772 msedge.exe 85 PID 4772 wrote to memory of 4384 4772 msedge.exe 85 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86 PID 4772 wrote to memory of 3756 4772 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dbaaa7a4d059d9ac1dde28d80410f541_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc6c5646f8,0x7ffc6c564708,0x7ffc6c5647182⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,7208668294594205701,8311051219038104428,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1988,7208668294594205701,8311051219038104428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1988,7208668294594205701,8311051219038104428,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:82⤵PID:3756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,7208668294594205701,8311051219038104428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,7208668294594205701,8311051219038104428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,7208668294594205701,8311051219038104428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1988,7208668294594205701,8311051219038104428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5188 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,7208668294594205701,8311051219038104428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,7208668294594205701,8311051219038104428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,7208668294594205701,8311051219038104428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1988,7208668294594205701,8311051219038104428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5544 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1988,7208668294594205701,8311051219038104428,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\058a541e-5e07-4a35-89ae-415d49f53634.tmp
Filesize5KB
MD55af6f368544cad3283c3f26eb35b6b13
SHA1f5a07e516d6d35287066549a8bb67026363c03dd
SHA256baaa2f1e2f28da87d40bae6e1d760bb9c900bda8c405f0042a9e251a02585c28
SHA5122fbeb68700aa97ad28f888d938316923e8318a281ac5cda495b5cc999f4de07074b2a4a6cde491ca3bccd08204cabd1e1178d572e65a975684d6edd38803f75e
-
Filesize
613B
MD5afb8d875854ae40ae4fa18fc92576b6d
SHA13a0aba9f0079dd99f370d8c02fb68d82e9ea42d0
SHA256a9fc4e097d1ee315bea220582bbed60307ecdb177628b4b6821d1eb2269a13a8
SHA5121ef3885a95816c598e896eb705f89c6353cc616607dbcc479d70db610f694228d7e56512f83fe98662b1116ccf8293f09dbee8aed4b34fdb9947fb27cc7dab13
-
Filesize
6KB
MD5842dec10a02963533ef68bfaeae88d91
SHA12dee02a127b58e1ee537adfcb62b540dc6337c60
SHA256de71e1a142649b6492a9e70c738f99238598ffa9084ca709c0c58ab8d73a3976
SHA512eb10da4e6487feb346bdf8cffb1a04b6e4be614bb896a1a9dc8515905759b40e238ec39773a5c663181cc9d71b7c6a2fb3401940d7bcf62f4366b1efdeb7b2cd
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5df1506414d61ce77833037210737d668
SHA1c5af8b1b80b76cce7cb0bf45283865de84e76df0
SHA256d16b7fed2efacdada0b143998bce8d94b856408ea2aab722e9fd77e94e9e5a7b
SHA512d61cb7354c40351d1685f22dec3bce778709f1cf70e3259b458529811709b33b84c374f7a02d1894373d043ac9143dfae4764b1b90cfd731982369cd77078a68