Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
de3c2cbd9ac83eab87f240d25fc0c068_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
de3c2cbd9ac83eab87f240d25fc0c068_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de3c2cbd9ac83eab87f240d25fc0c068_JaffaCakes118.html
-
Size
23KB
-
MD5
de3c2cbd9ac83eab87f240d25fc0c068
-
SHA1
da058767a6c75e7e2dc328d96776141665e73227
-
SHA256
efab1399b63fffa63f8b51e56453a15feedac13ad094b7c6a9ff75b8745aa9cf
-
SHA512
bf95a6a4191fabe386572fe3ab000f4c0fec9ff7a66f6dad52d696d0a81b02e0a4e60a09122f30ee958cb8232fb030a1508c18893c8bd73366427214fc783435
-
SSDEEP
192:uWTsb5nzKnQjxn5Q/yRnQiepNnKnQOkEnt49cnQTbn9nQjCnQt9wMBJqnYnQ7tn1:WQ/6Xw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 228 msedge.exe 228 msedge.exe 1436 msedge.exe 1436 msedge.exe 1004 identity_helper.exe 1004 identity_helper.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe 1436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1436 wrote to memory of 224 1436 msedge.exe 83 PID 1436 wrote to memory of 224 1436 msedge.exe 83 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 2388 1436 msedge.exe 84 PID 1436 wrote to memory of 228 1436 msedge.exe 85 PID 1436 wrote to memory of 228 1436 msedge.exe 85 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86 PID 1436 wrote to memory of 4160 1436 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\de3c2cbd9ac83eab87f240d25fc0c068_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8eb3846f8,0x7ff8eb384708,0x7ff8eb3847182⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,4509039792329079023,16000987617044545962,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,4509039792329079023,16000987617044545962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2100 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,4509039792329079023,16000987617044545962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,4509039792329079023,16000987617044545962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,4509039792329079023,16000987617044545962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,4509039792329079023,16000987617044545962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,4509039792329079023,16000987617044545962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5196 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,4509039792329079023,16000987617044545962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,4509039792329079023,16000987617044545962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4788 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,4509039792329079023,16000987617044545962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,4509039792329079023,16000987617044545962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,4509039792329079023,16000987617044545962,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD591dd57bf00a3da16b7b56cbd702b90eb
SHA1aaa5ab4febe1b76aaa8e2eeac7dad457a36a2c0d
SHA2564c69997b71c96cb1ecde5922ec1fceb2c1d4a412e2370b589e480837aca6e695
SHA512b2dc37cc35c0147d748d18c6248d049d70294e00c67b84c6734094e7461951e744b52e4c4cc43b1474907b157f0dc9c4e9b4a4382ecb27e452e5c44e49fd93e6
-
Filesize
6KB
MD581a7952fce1f9712959075b5380ea0c3
SHA15313090d4e95dc50c3309cab28bdae2c8f18d69d
SHA256eeaa5361d36b213ea64a408e68eb4406b04da27d1a9a73d71f52edf982763547
SHA512242209da0b2bdad350e963aeb60b7985dd637c23de3fb297aa553315e0a91e755f946d16ba746680e440ca59ed4e32bf572ff1f06339c927266c53585fdd87d4
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD52ea9bd2687150caf3d6b80e52b26a15b
SHA15460831487d0a90e2312d02c2bc85df28e729a91
SHA2567d78bf7f210209c37f371b4ebea27f2c41a265e4e421f67cff5073da2a35c020
SHA512b066340b82f64a288112964cac3ef3171e5e215b1638990d14951356f406db2664b01b4fac97c88bd056fb81a7e96f427ae06bc85bc25be711ee2a8028282a95