Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
dc49a87fc0dd13f9a9c5ba8c782d96f4_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dc49a87fc0dd13f9a9c5ba8c782d96f4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc49a87fc0dd13f9a9c5ba8c782d96f4_JaffaCakes118.html
-
Size
21KB
-
MD5
dc49a87fc0dd13f9a9c5ba8c782d96f4
-
SHA1
09b8972259c78e73adae049c0bf4766600655356
-
SHA256
179c67920abed7c101509b502938f8bc7c3318c07ef06bf416b63fc85b0bcda2
-
SHA512
fe58d30335302df1117a28beaff3f41883c4df9554f08e040b312b920ed485d2f31b852d0a95cb40ce2417e4e92141929f89d6754db03a873d7e940927c529fa
-
SSDEEP
384:1u70N4OocUxCB+wm7cqzxny7mU2cGtnyU/2n5qnyms4Ms0Mnl7MMoAY9BJivnq54:1hN7Uxg89
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2420 msedge.exe 2420 msedge.exe 4344 msedge.exe 4344 msedge.exe 3752 identity_helper.exe 3752 identity_helper.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe 3908 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4344 wrote to memory of 2468 4344 msedge.exe 83 PID 4344 wrote to memory of 2468 4344 msedge.exe 83 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 4368 4344 msedge.exe 84 PID 4344 wrote to memory of 2420 4344 msedge.exe 85 PID 4344 wrote to memory of 2420 4344 msedge.exe 85 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86 PID 4344 wrote to memory of 1496 4344 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dc49a87fc0dd13f9a9c5ba8c782d96f4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff974b546f8,0x7ff974b54708,0x7ff974b547182⤵PID:2468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,8852636957836562440,9797847211166676451,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,8852636957836562440,9797847211166676451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,8852636957836562440,9797847211166676451,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:1496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8852636957836562440,9797847211166676451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8852636957836562440,9797847211166676451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,8852636957836562440,9797847211166676451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,8852636957836562440,9797847211166676451,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5424 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8852636957836562440,9797847211166676451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8852636957836562440,9797847211166676451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:12⤵PID:1404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8852636957836562440,9797847211166676451,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,8852636957836562440,9797847211166676451,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3520 /prefetch:12⤵PID:4356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,8852636957836562440,9797847211166676451,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
523B
MD509f1adff6a9d789b3bc2ffa3d4625ce6
SHA19a2cea012d148344f39f3baac2557ee9641fa465
SHA2563c871c7790bde894379463f74a118037823416e3e044a50e820a01d1fc52cee4
SHA51270c514f92f55807b4b2fcbda54745fe338c1e6371624ddfbf85c1d134b7cbb8837407858abdbc75122c33a50f9464813f6c918fa2744386e9f2225ff885f8e40
-
Filesize
5KB
MD59aa1853ad6edcde50af211f8ef014886
SHA1eae9ee1fa856fab788631a689e16bb9bd29e7431
SHA25649dce41a0b492c857f703f75fc7352d3e42840975d220bd42520900f106ed554
SHA5126e04c33aeb3ade74d8e636694668b264b99138fa4cc853b820c4af1b5de77f7a94cbcd524f84a33234c123d9213d43fb79fb237babeb8ccda0a1ecab457b70a4
-
Filesize
6KB
MD5705c7fdbab44cc864a52de80a338c7e7
SHA1f8045cfe25e75ff231dbf62b9b19c06a8ae5fa57
SHA25674d7686a8f843d9cddae53641ae9dace17ee1929b1866591167f59703949d2c5
SHA512a9a12cc2b3d9cee31e195f1924450f1bf419b65327a7e8f27dcb7ed32213e54df3173a112de6944c84710515771f915c31dc174c00ab87650f12d64620b06325
-
Filesize
6KB
MD5d63c3b222ccc95f6a1a5e58a392754b4
SHA1796b5b9c5bf33f9d7362c2a4b81de0341f6d051c
SHA25665848ac356b3f3ffdb12201c36e26c16f97c32d32a8d042edb82ef23fd36d10c
SHA512c4eb711077980f3a3eaa397a7f3b63040cdfed2a49343cfeb441e63c8096a49e6e2b8fb93d36771b629e2703c084d39363fb02242bfde7a2d12ffdf5f4cdff7e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d55fc5667ce61f2fbb6a4131c4651e95
SHA1a9901a72fd8b8df0e5ad73bbc49f156e6e4d788e
SHA2567b6e6c4bba26652854f9d06847ca0bfb6e60d6e69a088c7138bcbe9af41eb8c0
SHA51262653445210d78f6464d46c2bed9b4e933e96dbb7516fa1cbc0d2eab73b634e0238e408223d950303abb5c79ce275ba10b8e97ada01a70b35f6934559a657df7