Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 03:04
Static task
static1
Behavioral task
behavioral1
Sample
dd8a990158502f2dd815cecd50662cfe_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd8a990158502f2dd815cecd50662cfe_JaffaCakes118.html
Resource
win10v2004-20240910-en
General
-
Target
dd8a990158502f2dd815cecd50662cfe_JaffaCakes118.html
-
Size
53KB
-
MD5
dd8a990158502f2dd815cecd50662cfe
-
SHA1
486f94c7ce85b1dfec0d20b49763f8f6ce9fd08c
-
SHA256
a6169486fdfb81830f95c6630d722abbefff8f2f91ea9d84d512c2cdf6674f41
-
SHA512
8647f4efaf04b4ad5834d25cadb36e5be8059e26e32b99644ee0b44f8b36bb4a7bd33c27fcc4be535e9fd31f49aec4235fa87912d8032e31a1718b4d2abc0350
-
SSDEEP
1536:SX51gDUjmED4sPdGPAcd9t9cpwpIBKXn9:SX51gDUjmED4sPdyAcsp/KXn9
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5112 msedge.exe 5112 msedge.exe 2360 msedge.exe 2360 msedge.exe 1428 identity_helper.exe 1428 identity_helper.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe 3416 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 4952 2360 msedge.exe 83 PID 2360 wrote to memory of 4952 2360 msedge.exe 83 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5088 2360 msedge.exe 84 PID 2360 wrote to memory of 5112 2360 msedge.exe 85 PID 2360 wrote to memory of 5112 2360 msedge.exe 85 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86 PID 2360 wrote to memory of 4820 2360 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dd8a990158502f2dd815cecd50662cfe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9dd2f46f8,0x7ff9dd2f4708,0x7ff9dd2f47182⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2564 /prefetch:82⤵PID:4820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:1388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6044 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6028 /prefetch:12⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4124 /prefetch:12⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5380 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,7065790017767233743,5761401781248644340,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57006aacd11b992cd29fca21e619e86ea
SHA1f224b726a114d4c73d7379236739d5fbb8e7f7b7
SHA2563c434b96841d5a0fa0a04a6b503c3c4d46f1c4e3a1be77853175e5680e182814
SHA5126de169882c0e01217c4ca01f6ead8e5ebb316a77558e51cd862532dbf9147d9e267f8db667ff6e9fa33164243724f5e437cb882392382f3cae1072dadb762c1d
-
Filesize
152B
MD5b80cf20d9e8cf6a579981bfaab1bdce2
SHA1171a886be3a882bd04206295ce7f1db5b8b7035e
SHA25610d995b136b604440ac4033b2222543975779068a321d7bddf675d0cb2a4c2b1
SHA5120233b34866be1afd214a1c8a9dcf8328d16246b3a5ef142295333547b4cfdc787c8627439a2ca03c20cb49107f7428d39696143b71f56b7f1f05029b3a14376a
-
Filesize
180B
MD5a2e78f87f1db2bf10dd92b702e7efa4b
SHA19a94c02a55c4958b1b83d406ee75ccd8d684a08a
SHA256144ca76c94551f668a5706f6a95fa744b3af1ec4b8058f2ba56b6c06664fe052
SHA51205a6a00bd899a44e7b26abbd2d6cca78954cb757d3a61ccaee84f59fdad0f47b84db7e7a28c29c52849eb282ade4ed1c4ce06c75512d9e8ccf2ff730542b97fc
-
Filesize
6KB
MD5aac4f4f58a0f87b67b5fccf9f17415b5
SHA10cd1601272c75d877f6aa23380495e51a6ac2d6f
SHA256ce63366a3d3a7bd3862f94f20ee546694660c5454a19879c09954314b16932a4
SHA5124105c59443ad6c7737ca4ba5e37315c4332f1dffbd10258222962acf07b66b56ecbc6e15950b058c51a14ac9f4396dd5a89161bcb080b1e1b24ae857ce4b7ecf
-
Filesize
6KB
MD572a41c7fc936c6f31073ebc09cc51f57
SHA1dd5e3e3487ca31d776c007434fab994cc4e40593
SHA2560ca722b781f304f9c619a3188b21f655b8323d613fd4d729f140fc20b5df8eae
SHA512405f08a19b228acaed3c7d0108479a01d4a61cb42a7cac3f818a750d6859a09a31cdb6054bae746ff382b6f6d4e36c089dc5188f91eb5352fca4c6a973232a8b
-
Filesize
6KB
MD5b93f1dc80bfd393763427ba766434f3c
SHA15c87b7300e6a1a7a8b42bb9d0603e0ee86d57461
SHA25642618a0ef918e92e4de4d78f1ab771fac9e203c381825aad9b16db5643690cf1
SHA51249e9485a04abb8e59a2e93d4035ae2c1b0a4c956f20b6a381729f14b5526c83eb1ca25146b1b712dca5b869b8fd7ed52fbc0510b4e0e107e8369e581c256aaf3
-
Filesize
6KB
MD52e815217ddc55e5eb4bfcfde0063f9e1
SHA12438d32ec3c6b9ee502459a5e6f449fba36376b7
SHA2562b4f09f6d578f6cec30f306f0cf1ba657770ae9b7d6110a1e02ebaae817d5614
SHA5127c433e234554d1412740f72af8a5191f6f091f917325c7cc4f11888b24c51740ffb601fc146855d1d688bbcaea39c35aa5cfa601cff3f9e4dbd1fa48d46a4df8
-
Filesize
203B
MD5068d23abaa66bf95babb522803e90e23
SHA1aa20f07da3409a20ef6f93c8981b7075ca41a6d6
SHA256d41e2c601610eb95cdcd111354901b11dc9234fe8b67503bf6abbbd92613f4c0
SHA5128eac87757f0575bbc7142f87e9e5104de1a180c9234cd28562c16c0495101953b7a87fa179ad94ce9489bba11b0e5f89116779b6eac8b4df100892dab1260dfc
-
Filesize
203B
MD52bf8c1ef9f05a2b8c287d471b86e1e13
SHA184276c4685bec6fe9387473c6129f843b093ce1a
SHA2565bd7d3806e9f9f5d20765180e51c87f4c65fdb6c043de12784bdce038ffdfff1
SHA512bcae333c1f33a1f72669e404fb9f85c384a509579773a4701ad4854c39d1cf12579744cce41e969d365f6d2eaac260243861a010e2928a292922e29868acee10
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD56b00ff9cf4b470dde63cda1086648a53
SHA171246174af24eb811273e395621a906fc96a3d70
SHA25675da4403f1ac1df45e8187ba84db73d299af96c31a8a7fcb32634bd0fb33ec4c
SHA5120358e68aaf7a7e5c4dbd27610fef4ed8867c5307541e6fc362176ab46a1e83d5bd0172ebe0473ecd7fee2e6c22893060960bcfe728710ce74a3f084eeace1970