Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13-09-2024 12:35
Static task
static1
Behavioral task
behavioral1
Sample
de4e03696831f977e217bd39fe6bae1d_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
de4e03696831f977e217bd39fe6bae1d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de4e03696831f977e217bd39fe6bae1d_JaffaCakes118.html
-
Size
265KB
-
MD5
de4e03696831f977e217bd39fe6bae1d
-
SHA1
bb91503a189596fc568d37039f6b72a5633e9e98
-
SHA256
e5cb4010337086f65815a8b4b33dc84b3e89f7656ea1257cc3ffca3adae04a21
-
SHA512
e20bb9b2d2b74eaa27a6c10d84d05fbe7053009cc14496157df9c41d3a74291d3974230d627d406c1767998566a59d6115a937d6ccf8494b3294370d3cf8ba02
-
SSDEEP
1536:+2QeZjI4ooYmdkpLLSSNNIIVVWWZZTTmmxx66ii99XXoobbWWaaggggiippppYYN:XZesLJQfx3+fRqfgCA27
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3644 msedge.exe 3644 msedge.exe 3148 msedge.exe 3148 msedge.exe 4060 identity_helper.exe 4060 identity_helper.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe 2692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe 3148 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3148 wrote to memory of 1492 3148 msedge.exe 83 PID 3148 wrote to memory of 1492 3148 msedge.exe 83 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3028 3148 msedge.exe 84 PID 3148 wrote to memory of 3644 3148 msedge.exe 85 PID 3148 wrote to memory of 3644 3148 msedge.exe 85 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86 PID 3148 wrote to memory of 3488 3148 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\de4e03696831f977e217bd39fe6bae1d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff51c846f8,0x7fff51c84708,0x7fff51c847182⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:1528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5832 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5464 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2212,12678997002539729168,13818704172971615136,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
829B
MD52d6061cf6a7c42b9d4de32a4f56753cf
SHA1d7dda6931c3bfafa8065c59e587e4f38414d83f2
SHA25690a6e8b7430f36d5aa8b1979f01b43dc9bd72721c812e97e9abab81f49258080
SHA512cd86a6dd2b3091993504b14e5dbe5c5de1cb09a23e679bf5582e11c365b45a3185a02646ab412bf5145c5e8fd5df914e3151eb06a6cfc332cf3f27ecb678532b
-
Filesize
5KB
MD511c4e910d70f5884f6c05aeb0a1bd5d4
SHA134a087d3178ae6839fab0a4ace5a3691e844a43b
SHA256a97abbfa7bd6a3b6fed5c8834f3b13aa3762a738185ce0176ea25e88463da83e
SHA5127ef58bb8a01bc29fa83c1f95ab6fb6a8a5422831682e208c6f17b4f9c9f22efe394487f8c1d03b2c7c2932d73bd9e7a10c1fda360b8ed5ea6e503acb405ac0fb
-
Filesize
6KB
MD5e7d0b36a205e3325e776393f34fc752e
SHA17ab796c13072eefc400088bba466de0d16bfed5f
SHA256c9bd9c53601009c45f49de028fec78130474122e46868b8acabcb14bce96f9aa
SHA512e09c23da5898f17f86c51b0ed4cbc0919099411f3438b686b8ce8e0b1e3fffc332f207af1107b27691d63952eb0df29769d433f0e541b1d938aa1e7a1524303b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59bf17797a6e1b3083e07bb8c451ecb0e
SHA1d31ee314b6b5cc0a2ea848e2f8ba29e150fb4d08
SHA25673070fd2fe553f4c01d95359d5aa09c0aaedb9283edfeff04a46d87fd6cf0bab
SHA5127850a92bdfda9b4a2cab97c4cb91485248e20e07f94da9b0a37968c79ee733c6162aaadae9c73355ebbb43c13ddde783dda43418d0b60eaa3bb318e406f923f0