Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 17:13
Static task
static1
Behavioral task
behavioral1
Sample
dcaf75a9409b39a9e0e370f52024d00e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcaf75a9409b39a9e0e370f52024d00e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcaf75a9409b39a9e0e370f52024d00e_JaffaCakes118.html
-
Size
213KB
-
MD5
dcaf75a9409b39a9e0e370f52024d00e
-
SHA1
93b009e04ee2e5feef060d07b4cb5bd39441a184
-
SHA256
99ba89f935260815b7cdf78cb96e249e11be7f3b870f80ef50ebf1416bec3ff2
-
SHA512
631d44bf94a3faec7fe94658a030608c14a62e31a639ed0b7e14dc239a57b2d79b56cd6f7f4dfba1cb17f2d212f9248ed0de97b853d59367459c7721696fe3a1
-
SSDEEP
3072:SiFgS2783cEdJXyfkMY+BES09JXAnyrZalI+YQ:SiFgEisMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 2820 msedge.exe 2820 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2820 msedge.exe 2820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe 2820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2820 wrote to memory of 3352 2820 msedge.exe 83 PID 2820 wrote to memory of 3352 2820 msedge.exe 83 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4660 2820 msedge.exe 84 PID 2820 wrote to memory of 4484 2820 msedge.exe 85 PID 2820 wrote to memory of 4484 2820 msedge.exe 85 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86 PID 2820 wrote to memory of 1976 2820 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dcaf75a9409b39a9e0e370f52024d00e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff7cdf46f8,0x7fff7cdf4708,0x7fff7cdf47182⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2324,10496953874452067783,5815817807793341293,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2332 /prefetch:22⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2324,10496953874452067783,5815817807793341293,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2388 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2324,10496953874452067783,5815817807793341293,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:1976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2324,10496953874452067783,5815817807793341293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2324,10496953874452067783,5815817807793341293,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2324,10496953874452067783,5815817807793341293,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4888 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1092
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2320
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD5eb1fccdb8c7035fa0b0da0125491c0fb
SHA12dcac4747bab1cfebd6c845ed13aad11cc5047bc
SHA2564ec24ad3ec733d33a5160db39613839fa52f92871344509e7c67163a8ad90e47
SHA512c43f0be4f069320cdcac2aa209ae136b907ad33ba996552748c983118517cff304848473745810b912bc8d1aa977520578117a8dbb7dd0e065a75a981b2fee38
-
Filesize
6KB
MD57f837354b1ea615cb6fed586d4e51d21
SHA1ee1ded884ab3ae883d3fd891893c92f9358becdf
SHA256881784adb2a815234b7f7391e3daf6d064474a6a8ac1f0dda1be7815fbb3c2a1
SHA5123648a3665dda1ba586318a3c97991a35304dd968c8c7878ce832b56276aa56caad1bb202faf24583f55535640ce7845d4fb2d09c276b349a6140db0538578b08
-
Filesize
10KB
MD522ab552055fa7ff658b38dda6a922165
SHA14604c8e519f792d342ba33270bd39c4a7232fab9
SHA2567bfbb64c2bf56f0ad3f7fb74595de142d0133d242d8e8101d14772d289be319b
SHA51250ec2c3f28336f05d4abe072fa8975420bf1cdde61567fa66cac24c24ace1b24242ac83a21f7a6c9b8d9d06554e7f1c6ff68a00fe8e9212f05176c556e7817b5