Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 12:47
Static task
static1
Behavioral task
behavioral1
Sample
dc4fb0a1bd8ec0394dddf8ed84984e6a_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dc4fb0a1bd8ec0394dddf8ed84984e6a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc4fb0a1bd8ec0394dddf8ed84984e6a_JaffaCakes118.html
-
Size
20KB
-
MD5
dc4fb0a1bd8ec0394dddf8ed84984e6a
-
SHA1
1bf4713e93207e9c76a9db8f596f7f5b028b4b09
-
SHA256
74bcd86df5c7beee0e447365cf7704ef5e59ac9d7b04a7877762f634adb30599
-
SHA512
bd48839a7251e219f650e84a135686ac443724d48318b68c1df8d79ba4368758fd251da5dacca167931126606df88a2324a59f59b0a8f3b75ade9f2e614924f0
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIx4xzUnjBhvB82qDB8:SIMd0I5nO9HJsvvKxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4892 msedge.exe 4892 msedge.exe 3616 msedge.exe 3616 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe 2300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe 3616 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3616 wrote to memory of 3780 3616 msedge.exe 83 PID 3616 wrote to memory of 3780 3616 msedge.exe 83 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4856 3616 msedge.exe 84 PID 3616 wrote to memory of 4892 3616 msedge.exe 85 PID 3616 wrote to memory of 4892 3616 msedge.exe 85 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86 PID 3616 wrote to memory of 2660 3616 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dc4fb0a1bd8ec0394dddf8ed84984e6a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa579246f8,0x7ffa57924708,0x7ffa579247182⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5189422111895508538,7256406912173433832,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:4856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,5189422111895508538,7256406912173433832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,5189422111895508538,7256406912173433832,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5189422111895508538,7256406912173433832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,5189422111895508538,7256406912173433832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,5189422111895508538,7256406912173433832,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1392 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
5KB
MD562d97ae47e467ab93d79319f8cbe7678
SHA1a6edf0346554f607bde70dcb8d91d198258f9f4f
SHA256aa7533c35e851ac94ff98a10b1cde7c61026ac026044ea3dfc9acd5b70b2447f
SHA512077d78ea11acc072df1bd86cfeef15afae3b81dc473d7a1046cd7c71355cd0e0fda018912492870fbb2a20e27708d680ffe4ae08e5b8a55939fdc66a79a71f51
-
Filesize
6KB
MD50e0c2e51e0e959ba714be1b08a2e7963
SHA1fa59eec26f357475668847a0164eeb03d921c6b7
SHA256d6597a784d25b328d9670fbf62dd26e47333c78c4152abce2e945883503f9daf
SHA512cbc49aba4c34ebd36a12f7b5617aaa0f12c26a87085078b4ae401f9c6c6070fa5df460d89c1118118bb235b7e31439aad84a0296ec8113fb9754c9bfb4821e00
-
Filesize
6KB
MD56ab1da06f0dc6f35c0f3f6d60467c6c0
SHA17ac32717b3d38bc3ffccb09c50630f31e25a0f8c
SHA2564ea8101db7767cf69b09c486a1e9569013927f5fcfb95b118f06f84586608816
SHA512057b20926da8d4e65c6317138a7eab46a49efa7fee17fa7f2dcb1ee93892f18e2dc014c0496a017b364040e390f4a509d3108cc9ff9809e1fbbc67254cfff63d
-
Filesize
10KB
MD5384af9936aa2b108f62078d8830d583a
SHA13dbfb4eaf3083a8506e23d0afb5be20578899a50
SHA2560a6b37e5ebfd25a5c957619495026ae6936140325a251bfe8f4387748777ebfa
SHA5124c9d3e24d4bbae9905ff50cd54608a442fb9ffbe11cd14605a5e7394d51c68b05aade7a6a6945dbbe69c5dfa8a7550410220087d344fb87586f175561a41ab6b