Analysis
-
max time kernel
145s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
dca0905b9f8011895e2ff8bc5cdc7de8_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dca0905b9f8011895e2ff8bc5cdc7de8_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dca0905b9f8011895e2ff8bc5cdc7de8_JaffaCakes118.html
-
Size
9KB
-
MD5
dca0905b9f8011895e2ff8bc5cdc7de8
-
SHA1
7c5ad266db7cbe0c4076452cf83ff56847beef0f
-
SHA256
09c3e66abcee02f5b5fda8cf505ae46d940b55ebc4713391975fe21dfcd4ae7c
-
SHA512
fed6e31eefd20128ee9c0fa49d320ec252c697aee72a0f32de4fc3f07c4d118b6eb437e75d636fd1b62ead26d552470ffa3fcb8eeca9443a156d151168505e91
-
SSDEEP
192:aHst3Oefcfdma1Cw1cFL397NdcAGRoOQiP8G:3fclma1CvFL397TcAmoOnh
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4184 msedge.exe 4184 msedge.exe 1528 msedge.exe 1528 msedge.exe 4292 identity_helper.exe 4292 identity_helper.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe 4528 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe 1528 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4060 1528 msedge.exe 83 PID 1528 wrote to memory of 4060 1528 msedge.exe 83 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4772 1528 msedge.exe 84 PID 1528 wrote to memory of 4184 1528 msedge.exe 85 PID 1528 wrote to memory of 4184 1528 msedge.exe 85 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86 PID 1528 wrote to memory of 3096 1528 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dca0905b9f8011895e2ff8bc5cdc7de8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff379446f8,0x7fff37944708,0x7fff379447182⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13980859425162339275,18190588355959936990,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:4772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,13980859425162339275,18190588355959936990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,13980859425162339275,18190588355959936990,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13980859425162339275,18190588355959936990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13980859425162339275,18190588355959936990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13980859425162339275,18190588355959936990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2164,13980859425162339275,18190588355959936990,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13980859425162339275,18190588355959936990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13980859425162339275,18190588355959936990,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13980859425162339275,18190588355959936990,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5628 /prefetch:12⤵PID:2360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,13980859425162339275,18190588355959936990,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:3144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,13980859425162339275,18190588355959936990,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
5KB
MD5c3ca7477b9c7be438070bc4e2b5ff697
SHA19ecbb485637f3f20bfe61523b8ee42c8aab03083
SHA2563692c0c2761502dd10a8d0a816b3c345f68b45df57d529c4962d530121818a9d
SHA512a5003d0e4f113ef44524dbdcbe7fcdca99236be787750c40506cfc58f6f4e91c0efa149cda9050a9f61aed0b4c85a147dc06d4b1777825d929e4b9b29a6ce021
-
Filesize
6KB
MD5b0a5c949757a1f60224c73c726468683
SHA1345abb596c77775e593856fa35c3eec74dd0f46b
SHA256d5a79f8fd992b436f6b0191c9edfacdf0eef0d033679fffdf854c0614f9aca95
SHA5128420e3ed50d34349cd647f462fb2eacf72158836d090e50f871bf1faac43c82a026b831af1e68bddf0e4d56c54926e38e07224e4d3900fb743992cd20ab7f438
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50ae93d87c41976e9acb475541323ad0d
SHA16c267e30c937eda6959510a2ce581f61b6f5d2f1
SHA256a743b55bc00af57f5b70a59d3e23ed74367f2d5e9ace7a1a5928309d9a3a1e2b
SHA512824c0e9b94679a1a0fc4a3dff0c877f71944278e7b47d7b0c05a639959a8640ea209dc28f0aa4a433c1075c49b6d131f22e427dd07ce018646ae2fb43446404f