Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 15:39
Static task
static1
Behavioral task
behavioral1
Sample
dc88033a7a6741825b4f6ecfb31c4e0f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc88033a7a6741825b4f6ecfb31c4e0f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc88033a7a6741825b4f6ecfb31c4e0f_JaffaCakes118.html
-
Size
20KB
-
MD5
dc88033a7a6741825b4f6ecfb31c4e0f
-
SHA1
c1a6d59854cc4ed4bb50b4bf48c79e032f2c209b
-
SHA256
1f757d16d3cd31b034bddc0bfb6f8ef116273459a8690241489c412b72ba2ee5
-
SHA512
42a207a18b6090c5ce4b8e7adcd1d3b47a8c6b66f12ffc7d09f09eea3385573e52393b15658f9f1d6ca2ee0a8a6c85c02e6ca2cf9530ed4ac5c1bf141a9f4fd9
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIg4ezUnjBhyE82qDB8:SIMd0I5nO9HDsvyHxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3540 msedge.exe 3540 msedge.exe 3992 msedge.exe 3992 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe 3788 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe 3992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3992 wrote to memory of 1584 3992 msedge.exe 84 PID 3992 wrote to memory of 1584 3992 msedge.exe 84 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3668 3992 msedge.exe 86 PID 3992 wrote to memory of 3540 3992 msedge.exe 87 PID 3992 wrote to memory of 3540 3992 msedge.exe 87 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88 PID 3992 wrote to memory of 1060 3992 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dc88033a7a6741825b4f6ecfb31c4e0f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83fde46f8,0x7ff83fde4708,0x7ff83fde47182⤵PID:1584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3779281876002566901,16963955392762776540,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,3779281876002566901,16963955392762776540,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,3779281876002566901,16963955392762776540,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3779281876002566901,16963955392762776540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3779281876002566901,16963955392762776540,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3779281876002566901,16963955392762776540,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3248
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2544858b-92f4-4864-a8f9-39d83a45a099.tmp
Filesize5KB
MD580e960a5dca95bf2bab54d524864a9fc
SHA144424a486bfe0c275fcdae6de8ccfb2a5e34d464
SHA256409ed7b7dc6c4a8337e0d185d100064c571c6b962ba3bfa48ef7d6c8db6a6a85
SHA512aa668237af5abdb27e3f0a44ec6a41edfd7b1242ef016d9451933409623ab7571e45e35c7a0e0c9116bbe2b8444fc657c116eab73b567d6d3d969de6fb105efa
-
Filesize
6KB
MD549f6859dc0dbd1e4404c3f21ee7a293c
SHA172d6a7d62fe7fde95d681100cc8787b0755f594f
SHA2564a2b35dd60001c2f61cf1b5bd7ca7077cac12b6aa823f8c7ac41ee012003a57c
SHA5126a876921352e3444f730b48013b0611d022a57bb4850350663d6265d418a1f32266fb09626e732d3908144a8e7379907da0d35c551babbfd356a92c8680f1cd4
-
Filesize
6KB
MD50801ea51266cd141a63533c952312968
SHA1014d3d4dcc0b5756939bfc4293ed9705544dad0d
SHA2566372e4a6fe4c519ad094e817205ac0ce568b535d80bdb25bf74aa54aec901061
SHA5125a4e01b1ce4556866bd9f82901247293116f1196bceb82e2f6dd6fc5fbdf8898149e4e72ba541c139ba1db9504f6c3ab31040c7713a268c97f108494936db614
-
Filesize
10KB
MD5c703f9027724714108b5f6a35684e042
SHA191c4a6f5a8344d638a3796141226e50769423aa1
SHA25666a06319534c7fe2f87eda6e47c10ef9588ab10a07a679d3f69455476cb2c78c
SHA512c326b8000f1b250443e581b15b08a94bd82a1c3e81c3dd83627fa4a5bd52aad1e151dc7305c9156c97e9e68089f8985c31db442290e7c787d215fff3775aa8df