Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 14:56
Static task
static1
Behavioral task
behavioral1
Sample
dc772759c9e162ddf7a28ed8fbf64095_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc772759c9e162ddf7a28ed8fbf64095_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dc772759c9e162ddf7a28ed8fbf64095_JaffaCakes118.html
-
Size
4KB
-
MD5
dc772759c9e162ddf7a28ed8fbf64095
-
SHA1
e55c7c43dc930009670f0db259e87f86e6092245
-
SHA256
6b514415b5870ea162f4c51caef2f27be4463a7f4a39ff9ac15ba2aae565d03b
-
SHA512
57bbc037a0782f7caa6a9f46fc399bfae22344d8ac1fb22b95beaf9fc7951dd5405aa567c45d50054b612a49a3fec4cd63767714850f703001ea7941ac290b37
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oUhIx80S:Pk7yY1aEFHVKtF37sNjtXATIQFM93pD/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4256 msedge.exe 4256 msedge.exe 756 msedge.exe 756 msedge.exe 2960 identity_helper.exe 2960 identity_helper.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe 756 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 756 wrote to memory of 1904 756 msedge.exe 83 PID 756 wrote to memory of 1904 756 msedge.exe 83 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4908 756 msedge.exe 84 PID 756 wrote to memory of 4256 756 msedge.exe 85 PID 756 wrote to memory of 4256 756 msedge.exe 85 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86 PID 756 wrote to memory of 3936 756 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dc772759c9e162ddf7a28ed8fbf64095_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcb34c46f8,0x7ffcb34c4708,0x7ffcb34c47182⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11680312481976564349,10175802850254374047,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,11680312481976564349,10175802850254374047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,11680312481976564349,10175802850254374047,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11680312481976564349,10175802850254374047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11680312481976564349,10175802850254374047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11680312481976564349,10175802850254374047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,11680312481976564349,10175802850254374047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11680312481976564349,10175802850254374047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11680312481976564349,10175802850254374047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5328 /prefetch:12⤵PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11680312481976564349,10175802850254374047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,11680312481976564349,10175802850254374047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,11680312481976564349,10175802850254374047,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
292B
MD538a73b89e554942067c1b0859949fee8
SHA1b69bef96ea4bce128027e6590ae768586ca2f14f
SHA2560b3af6edd9c250f8e6f6c8a6ffd32589b9c49d5573c009459c0c42ee50a52416
SHA5128fb94ef690b18cc1eb3aa63e0e00dd5d516d99c4ee8b7848207593ba2aa4ebeee73d91d107ea93bea6f5fd8dbf00174ae46be0eda4e9329fea2eafcac2cee031
-
Filesize
5KB
MD54cdcb850e8a1ee7c7c9229827fef82f4
SHA12a9007fa5b4400ff8f7bf788ab79df8db9c7f664
SHA25691ab5a39860177a7d5d611ca1660f9c7a1988f590fa189eeadf4b50a5efa24af
SHA5128a9b27788a861ee5f6bb7f0741cc29dc3dcd0b9a95e74939da4f7c2736b0d59b32fca70516d6fd76fb0534e3e6ac8d9b8d91f223102005ce43301e3a620694da
-
Filesize
6KB
MD53884cfcfa22353e878af46d0f67dde3c
SHA106895e3ab0c41a1f234da3ee51fd3bc4c61ea70c
SHA256e6dc9fc1c9942d3463e38940f22cbbead5b7c10e690c3a3ea56015679216a469
SHA5126b5728632955abcc6fe0395a596f2cdd4511498b9456d9c4368b25b2276c4346ea06f3fd35925430dd0a4d3a9dd52e526095ee8a75fd2754c088bed3edb033c8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52484199aeeae486d9607b1f07ae189ef
SHA1df33eb0bde59ad24047ebce4f498ef55f66ae75b
SHA256418ff3cfc89fee9858e30978ef41af257601b1585db1a000deac32461b411e18
SHA5124cdb55e00be63c5c00f64b65cda7a02e31f3052f72632ceab25514ad8449cfd387e329925616329330f286ba2155122eee66bc4f1335cc9b4c6530523aa07ece