Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 18:23
Static task
static1
Behavioral task
behavioral1
Sample
dcccb126f96b702b9f2ff319c7d7f318_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dcccb126f96b702b9f2ff319c7d7f318_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dcccb126f96b702b9f2ff319c7d7f318_JaffaCakes118.html
-
Size
139KB
-
MD5
dcccb126f96b702b9f2ff319c7d7f318
-
SHA1
75d5f0bcfe85b09dfebb20488130da437c6853d9
-
SHA256
b764a0609c2dcb8cc6a68bb3ca3fd958fbccfdfea3420e21ead2c1eb1b348f90
-
SHA512
cf486f82dab537dbaa2148e45bdd4faf40c1f53398870ca318e1f733eff045617c31c9483e47edc479b68cad4b3a831c9051cad0ccfa07527638a2dca5067c8f
-
SSDEEP
1536:SSsv1aPjfPlyAyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SSsayfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 3784 msedge.exe 3784 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe 2464 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3784 msedge.exe 3784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe 3784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3784 wrote to memory of 3000 3784 msedge.exe 83 PID 3784 wrote to memory of 3000 3784 msedge.exe 83 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 2412 3784 msedge.exe 84 PID 3784 wrote to memory of 4344 3784 msedge.exe 85 PID 3784 wrote to memory of 4344 3784 msedge.exe 85 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86 PID 3784 wrote to memory of 368 3784 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dcccb126f96b702b9f2ff319c7d7f318_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83a3746f8,0x7ff83a374708,0x7ff83a3747182⤵PID:3000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,5397312534533479955,5821242119567185174,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:22⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2252,5397312534533479955,5821242119567185174,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2252,5397312534533479955,5821242119567185174,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,5397312534533479955,5821242119567185174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2252,5397312534533479955,5821242119567185174,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2252,5397312534533479955,5821242119567185174,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1940 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
477B
MD5c13efe4052f461cbe92d5287dbec8016
SHA1f24e00987d4c2e927dafe791d1916a3c74166235
SHA256c0e840b151f8094c33744df5438f16b16682a8f1e0befb6e89e3b1e27e2aa36d
SHA5125b903fa159817eb7fb2010b6b016e5ea3bf32953d4c0ae14b35d611afa2e594059b3048019509d5eb842b2532f496a2d6731ce41bcba148445070941fa06f46e
-
Filesize
5KB
MD524219002b1b3a2c74337c1099e9df475
SHA1eba8dfbceba28edca55596f9424c529a344efa1d
SHA25677e9f826a2ba720c88d4bff940c5276adad7c0913699164ebd6ebd416e218a64
SHA512041f643c3ba1e3ad1de86fa4aa2c822e3ca9653420e1bb57f082a042f386e5e121fba7fbe6520c406c3fd72fb2cdb2950390c6e9a835b281b319eed7f01dbadc
-
Filesize
6KB
MD53d4c59c0a75b55373c1fca007c0ae51c
SHA1074a9080c7fe14cf8b134db257e8e9f1261b47fc
SHA2568bb76bf299d2d06f2e8c4cc0e7ae78bf66208cc864294e7b562c2a57fda8fe1b
SHA5124b3911788f7cf43f81d50d3e7a68506b6e86bdedea0edb82cac71f17f8c51e7210ebf9315d4675bac2c85e7adeb109445cbbfd6081ea4ea347c5588a4e9d0925
-
Filesize
10KB
MD5023ec56d963df03829507e5850d7d2e2
SHA10a95a41795919451211207e1549185ed5f90986a
SHA25663765a46a22137e5fc5c8e743ec22c9d153d48a33dece2514d283e8277260cde
SHA512c12eca64360c63917f7397443de89b960fd638659c45b23c33b3ec10aba53db2ac7bd278e160b41694fd37438d6c774375de0dbf4207c8cc9c317eba28655ab3