Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
dcba7e3a2a52f54502138edc3e282d59_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcba7e3a2a52f54502138edc3e282d59_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcba7e3a2a52f54502138edc3e282d59_JaffaCakes118.html
-
Size
20KB
-
MD5
dcba7e3a2a52f54502138edc3e282d59
-
SHA1
08eb8ead1ec4b3a1c0873a85b6c13b7b1a7c706f
-
SHA256
24650548931db7230c294637c151079c17bb3724f9e94958ad1d941b127da001
-
SHA512
0c3c81db7dbecd5f4383f753107f10ec6f8bed56cf070e442cdb7964576f7211f90ee465e9044f89901aedaea5853b01cbcf14202b7eb3a0681f18a3d6908b7a
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIY46zUnjBh+g82qDB8:SIMd0I5nO9Hnsv+jxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 64 msedge.exe 64 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe 1848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 64 msedge.exe 64 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 64 wrote to memory of 5036 64 msedge.exe 83 PID 64 wrote to memory of 5036 64 msedge.exe 83 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4056 64 msedge.exe 84 PID 64 wrote to memory of 4392 64 msedge.exe 85 PID 64 wrote to memory of 4392 64 msedge.exe 85 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86 PID 64 wrote to memory of 5020 64 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dcba7e3a2a52f54502138edc3e282d59_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeadb946f8,0x7ffeadb94708,0x7ffeadb947182⤵PID:5036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,949688757451480284,635115772761273655,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,949688757451480284,635115772761273655,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2116 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,949688757451480284,635115772761273655,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,949688757451480284,635115772761273655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3144 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,949688757451480284,635115772761273655,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,949688757451480284,635115772761273655,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
5KB
MD55b0f804a0402ba45c844799bf0d776f6
SHA1d027836d0228484a7672aba2c0a35730cc956705
SHA256c1818cdcc86f3f478d36616956f4fafcd4e4dc0382c67995622ef36ae6664ba7
SHA5129c7cb01e7f2b9b11e048fef8786ae9c6c86294781d1518334511f190a20996fb83207a75316608320f168106b44fa177c377418688527121b4ab2ef74ce0b0c3
-
Filesize
6KB
MD51752fac82cc84d99745e031147bbb61f
SHA124bfb14904e30ee13d7a2d04453c290e7a012fcf
SHA256b4bbf0b29c3ee272f8ca192549983266fec9eceb752f31227cf2c60f9d015362
SHA51240bdc96ee6532ee6ea2f0fa0bad0b4b1946ab151eb63982dd5ed0957750c3fac31025df72c24ff662da19e3733ff8739d4b45f446e45e0435bbe86441505026f
-
Filesize
6KB
MD52a2c58d38990c8aba43a884451296012
SHA13bad53c511a7641b3b82b0398ae848064d4140e0
SHA256d27770b1a5ab62a397484f73a8d5f97e6f3b783d8333f2ba2ee582ec62360a43
SHA512e6b65a249cc32b785e7f69472ea171577f8a6071101adc387294c6f52cd38cdfad804d5c55b23779300a715428d582480d05df3833d1966925db5b02c640b212
-
Filesize
10KB
MD54acb671fdc790779b9f0ea1601524870
SHA19886fe38a994c20fbec5ba516352378976f18561
SHA25634626a1c1e64f4aa029275c9ab9a21a9b88224739968addbd220785c46fa7851
SHA5126d56dd608fa4d4bd51ec55c9f5f287e6acbf71d039e3e8153276de97542b1f5a1a563aab81ddd0ecd0b7830f8c737ecbef68b6ffb9913fde5f94cd3497f2568c