Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 17:25
Static task
static1
Behavioral task
behavioral1
Sample
dcb3d8dfa0abce5fd229553dc770053f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcb3d8dfa0abce5fd229553dc770053f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcb3d8dfa0abce5fd229553dc770053f_JaffaCakes118.html
-
Size
36KB
-
MD5
dcb3d8dfa0abce5fd229553dc770053f
-
SHA1
eb4e7b7f3ed6434436ae94811ccab1c0dc3d14f3
-
SHA256
0b1bd69a72691b15f72c805a10c474a58b7ce449ad93561c3b2c54c4bd0bc6db
-
SHA512
08df11055de27d3ec67c8df63cca97ea4c0b4472224888c17756bafe33bc98df4b9813435647431a14046d34d726ad6688ca2a908e233e16e72517dadd478654
-
SSDEEP
768:zwx/MDTHIS88hARiZPXJE1XnXrFLxNLlDNoPqkPTHlnkM3Gr6TxZOd6DJtxo6qLh:Q/LbJxNV/uxS0/88/K
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1104 msedge.exe 1104 msedge.exe 3704 msedge.exe 3704 msedge.exe 2696 identity_helper.exe 2696 identity_helper.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe 2160 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe 3704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3704 wrote to memory of 368 3704 msedge.exe 85 PID 3704 wrote to memory of 368 3704 msedge.exe 85 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 4076 3704 msedge.exe 86 PID 3704 wrote to memory of 1104 3704 msedge.exe 87 PID 3704 wrote to memory of 1104 3704 msedge.exe 87 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88 PID 3704 wrote to memory of 1056 3704 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dcb3d8dfa0abce5fd229553dc770053f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb95f46f8,0x7ffbb95f4708,0x7ffbb95f47182⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2679862180764591661,1211481206981403515,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,2679862180764591661,1211481206981403515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,2679862180764591661,1211481206981403515,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2679862180764591661,1211481206981403515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2679862180764591661,1211481206981403515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2679862180764591661,1211481206981403515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,2679862180764591661,1211481206981403515,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5456 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2679862180764591661,1211481206981403515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2679862180764591661,1211481206981403515,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2679862180764591661,1211481206981403515,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4080 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,2679862180764591661,1211481206981403515,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,2679862180764591661,1211481206981403515,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2160
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
613B
MD57b07cea1f33580010bf986823132e649
SHA1b2aa56408e1c24928be33117b8f4627390ba4a6a
SHA256d6e5122baf88c09312d86529898972253ee5c7a5a35b37e75c457af874561f5e
SHA51292fa9ee6ff0486111aac2ee741c32f07e4bc380161bea026789d57d94a0f887a317da351ff99bcda78669bd49737203051c08d010dc1e4ac1047e959414f791b
-
Filesize
6KB
MD50f9eb5ac36fc24926c4329dc0aefb20c
SHA1402bc6b104d2bab56683203ea2c7a90fca6f19ff
SHA2567fd07b1d9d108303de01a220632e751c4dcabdc73c2853a98719d2146bf43aaa
SHA512117342a38fcc36dc3ce50c91ea889e360b4ace4cde073d2157bfbfdd9f69807baa8b2ade95b3bb2d05a02ab4e9dea9c826190c26b50378f0d9b99bbf7850d3db
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\c7ed1af6-7e26-4705-b673-c426b940d471.tmp
Filesize6KB
MD51516fa56657eb3a5a556ddb66e4976a0
SHA1cb4da2f5f5d14b8a01630f624d68a237fb177a37
SHA256c324a27343db878b7183719e89ed367b45a542d29f04665cc10a77e8c5ca9cb1
SHA51231caf75a053eb4ace2a291172379ab64a883c7f2193235a5f128f8f7ea69dbc46db27c3cbf6d3b4471b8abdfccfc302d2f21e0dc150dc716083f8eb610dfbf02
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5471f5c5022bc38d78bc42953e6da062d
SHA15556f0264132d882f419dae44dd800cb94f635fc
SHA25608ecc73d2e47ce6cc352ec1fef23b8e20751623bc89f894ecad2bac9af78ac65
SHA5125146806deafc0cefaebb2cf592089bde5296b5bcb3389cd67f7437d7a94dbbe8b2dea6cd1bb9bce21686dd7dd62f6c107f9462041ed5eee71dc59c35a557a6b8