Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 02:50
Static task
static1
Behavioral task
behavioral1
Sample
dbae3d3ad48ed5b8bc94a36637c3cfbf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbae3d3ad48ed5b8bc94a36637c3cfbf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dbae3d3ad48ed5b8bc94a36637c3cfbf_JaffaCakes118.html
-
Size
2KB
-
MD5
dbae3d3ad48ed5b8bc94a36637c3cfbf
-
SHA1
60c266194730145811f0f88d7ff1ca0bf718d63e
-
SHA256
c6e39879c7e16344f8f089e11eded3236a1b8b44fe0bbb6e55116ebd0eb24537
-
SHA512
0e04400814c4145f9ccb29f038ff18910142c1d2992d91c779e11ad314c38acb2fc2568f55a62877d25690ed1c3cea7bc86e24dd88579fc5bf2ae097cff48fe8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1880 msedge.exe 1880 msedge.exe 1196 msedge.exe 1196 msedge.exe 4380 identity_helper.exe 4380 identity_helper.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe 1888 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe 1196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1196 wrote to memory of 1180 1196 msedge.exe 83 PID 1196 wrote to memory of 1180 1196 msedge.exe 83 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 824 1196 msedge.exe 84 PID 1196 wrote to memory of 1880 1196 msedge.exe 85 PID 1196 wrote to memory of 1880 1196 msedge.exe 85 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86 PID 1196 wrote to memory of 1780 1196 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dbae3d3ad48ed5b8bc94a36637c3cfbf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8bcad46f8,0x7ff8bcad4708,0x7ff8bcad47182⤵PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13628713046103196542,4857302474626676348,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,13628713046103196542,4857302474626676348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,13628713046103196542,4857302474626676348,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13628713046103196542,4857302474626676348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13628713046103196542,4857302474626676348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13628713046103196542,4857302474626676348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:3320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,13628713046103196542,4857302474626676348,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13628713046103196542,4857302474626676348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13628713046103196542,4857302474626676348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13628713046103196542,4857302474626676348,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,13628713046103196542,4857302474626676348,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5500 /prefetch:12⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,13628713046103196542,4857302474626676348,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2792 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1888
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1948
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4312
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
5KB
MD50a69c0574a5f8bdf1ab906cc8c6a68b7
SHA101237fca085970acf33fbfde44e39f43abf120c2
SHA2568f23430bfbf2e349f2808cd006e05adf934f918ad455c1baccd65e086abdd8fc
SHA512ea35a53472f119074af59c92293ab3e18e190f4de8aa0106caf92e0bf808cb99049062fb32293bc232fea5fac29dc4949db24f4d099cac631fd61b5bff783264
-
Filesize
6KB
MD5cbac70148dbd99d6b33552887268401f
SHA10f96dc41dbca154bd59616623b50a13b62d68f71
SHA2562c1681b1dbd5ea8e8a7fd5b50807a835d829e6b12d4f1c40bb301853360f3041
SHA512c5f2a19dbbf592c446405831b453bac5d5333d35b36ea6a11a77f9367648dfe451a893bae5b2b4401fe67ed31c72b356037c8e53a46de7d0a1c81879a347d8f1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD513ef49ee9ebad91162371063901aee72
SHA1f918d494030c5918e7ed0baad025a56c2d613f2c
SHA2565a16894e9e80a4b6f55295495cb0c3dcfbec9c6ee233715fa8ad7ddba9693f03
SHA5121922458e43cb57c29cf2126565253f88827337cb9e2913e263daf8e6d2fcbffaa429efa5cffb960a31b57f9b11c881a141f3ddac138ffd4b8772f3003abce629