Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 04:33
Static task
static1
Behavioral task
behavioral1
Sample
ddae3a8faf5274b46da23048f48377d4_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ddae3a8faf5274b46da23048f48377d4_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ddae3a8faf5274b46da23048f48377d4_JaffaCakes118.html
-
Size
751KB
-
MD5
ddae3a8faf5274b46da23048f48377d4
-
SHA1
67318cd9093324d4810f610a426763aef31cdf2f
-
SHA256
892ac33601f342b5689c62367aaa90fd6be08ee42eab163675c757a86344c298
-
SHA512
9392797ac619a9a359f7e811252342ee8e2835b205109699698f744760596f82db803304fba3f0a5b5fd91f0353cfaf78ad9e174c18c3f0c6dc969742db5078d
-
SSDEEP
6144:RpdcvxhsdWYPEpk6xsabjEfZonvxikEq51T+yYBIMfFsvpoZNhoXKXEPrSFQTFqB:RyYMU/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3920 msedge.exe 3920 msedge.exe 4644 msedge.exe 4644 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe 1116 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe 4644 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2512 4644 msedge.exe 85 PID 4644 wrote to memory of 2512 4644 msedge.exe 85 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 832 4644 msedge.exe 86 PID 4644 wrote to memory of 3920 4644 msedge.exe 87 PID 4644 wrote to memory of 3920 4644 msedge.exe 87 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88 PID 4644 wrote to memory of 4308 4644 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ddae3a8faf5274b46da23048f48377d4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0a3046f8,0x7ffa0a304708,0x7ffa0a3047182⤵PID:2512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,3711803449681316389,4838106896629498004,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2248 /prefetch:22⤵PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2216,3711803449681316389,4838106896629498004,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2216,3711803449681316389,4838106896629498004,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,3711803449681316389,4838106896629498004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2216,3711803449681316389,4838106896629498004,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2216,3711803449681316389,4838106896629498004,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1116
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:620
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3232
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
277B
MD5682fc94b30701499e4c1fc1fb1b596ba
SHA1d29b949fa22fafce067e4ede0d9483726313e8c8
SHA2569c8c42a334252cb9e2d30915e49d58936986e48ed1c879280d1b9885002eff4a
SHA512d96353a3c811138e9295537b5b4327b0f366679502c307bd2a76ffb558e26f523dc55b9ee3dc8762292dcb9f2f0d07bc925eebaaed45586df2e1108fd6a4d79e
-
Filesize
6KB
MD531a926e733d2f24f21281943657b3d4e
SHA1f41d3df6c20877528c7a4541e012f25989a464db
SHA256883049663d437ebc32f5e7bb386343d82849fc76ec93bceefe96d7a1fda092d0
SHA512c8fb86e93172e367c35fc09ab90d1070a95e6fd669c31b55b3f91d6518598d9861be37121324ace08ca6b34af1a47018fdff3485d4cebbbcb49c2071e9853f19
-
Filesize
5KB
MD5f261a7aafc9e2a86fef896c3bcc3aaaa
SHA1054bcd57438353755368ef7c55b2fac3713b9b86
SHA2568308a21ede0c9964577f589bcbf5ad8c6f1a1ac0ce36bb30155af831ac0c9398
SHA512fe50b04dc0617fd7903e18dc0039359fb947eb149cacaf1bfcc64099a59d627c5a3b339f04b40a868dfe30cbf46ec73c00f203d95c117bf7e8b04e54b3f12a23
-
Filesize
6KB
MD59e8554098aadea34cc306f341192462a
SHA1e823356639cf73251b01498320f7fcf9dc7cc665
SHA2561a73cc62c4311b207afd50b0171fadf3f4bc359712b9adce69ca9a0a6d5b6b19
SHA512db2624a7fc95b87fa91904f20b7bef24cbc591c0f2146bc0663af5aca7248b316625a66b88fe8602aa4677519e361afcc921412bfccc49892b39003ff52bb231
-
Filesize
10KB
MD59cb9fa39f5ff7892fa00a5fa9337d2bc
SHA199bfe5a693b344269131480a78060278a5e8ae9b
SHA25627b5fd0ae5643e6bf65d1117cdfaec2214484864066ca231bfd010c9a6e50b19
SHA512b6755cde9d881ad5f3ffdeea1be2afebf7a1b51a12770aba7cf561f989cee17aa2edb8ea3f0157defb705be197ca112fbae8c86ba367cf0bd04adec0c5166796