Analysis
-
max time kernel
145s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
de7a4ecb0e0542747fafccef889bd0db_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de7a4ecb0e0542747fafccef889bd0db_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de7a4ecb0e0542747fafccef889bd0db_JaffaCakes118.html
-
Size
461KB
-
MD5
de7a4ecb0e0542747fafccef889bd0db
-
SHA1
603e29fbc33c9ff9a9ad1c6bbcc877a508eec0d5
-
SHA256
ad1c4417fdc3f463479cba0f985499eb683ae42f3e0f65ee65960a1f2eef2ec6
-
SHA512
d51ea6efed3da1f811973a1efd336e380bc7e6d4974c18d2ceb97a2dbcac36c28196eeb12c47f6db3a35b3dd371dc387667d347fc5b223f43fe65f37243efd18
-
SSDEEP
6144:SEsMYod+X3oI+YFUsMYod+X3oI+YgsMYod+X3oI+YLsMYod+X3oI+YQ:p5d+X3Pi5d+X3M5d+X315d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1956 msedge.exe 1956 msedge.exe 3488 msedge.exe 3488 msedge.exe 456 identity_helper.exe 456 identity_helper.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe 3924 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe 3488 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3488 wrote to memory of 4308 3488 msedge.exe 83 PID 3488 wrote to memory of 4308 3488 msedge.exe 83 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 3584 3488 msedge.exe 84 PID 3488 wrote to memory of 1956 3488 msedge.exe 85 PID 3488 wrote to memory of 1956 3488 msedge.exe 85 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86 PID 3488 wrote to memory of 3472 3488 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\de7a4ecb0e0542747fafccef889bd0db_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae1746f8,0x7fffae174708,0x7fffae1747182⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,14844768961988950557,8622122470721351010,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2028 /prefetch:22⤵PID:3584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2016,14844768961988950557,8622122470721351010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2016,14844768961988950557,8622122470721351010,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14844768961988950557,8622122470721351010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14844768961988950557,8622122470721351010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,14844768961988950557,8622122470721351010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2016,14844768961988950557,8622122470721351010,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5100 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14844768961988950557,8622122470721351010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14844768961988950557,8622122470721351010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14844768961988950557,8622122470721351010,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5696 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2016,14844768961988950557,8622122470721351010,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5748 /prefetch:12⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2016,14844768961988950557,8622122470721351010,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4404
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD5873262c29713e5f0539abf2a034242b5
SHA15ed2e1920b197cc227ee88235dd3e5f4a2a60578
SHA256fe26a2a4282a1e7f45231710f5b0acf9c3612ce55831f5f8be2fea0f977f7861
SHA5125b30057a509a0458f77a7004a7a08855a92ef86e6c94515e60476791ab28fe0ba7ecf24684f31b26a622e9fa504a98550fea5263f97c74c74caec85ca00360c3
-
Filesize
6KB
MD565242b0b9da43109fe6a69d5928e7d6d
SHA11397cfbb3363130da16694c6e41ce97519167dd5
SHA25617408cecd28e6a73314bc74789c4b35d0bc6a6fd52153fcb15bf423721fd83d3
SHA51288ef536c1ccf259e306f532282bf2c8c4f15cc0133637986588713c7eb4374292fcc2b34b0b6bd63f0109b49e60be064a36aee15dc5d20a38bd4d9359ef090f5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD527e33500aa8e8e7fdcf08e128b1ba26e
SHA1b221dbbe567ec80ee9e986a3cd8157336f6a61ed
SHA256d8a3f55ec223c9058f049eb7017414de8c658c273ea8688de9f91202953f3ea6
SHA5127a5c1f81aa49645364aedb450c5df4a034236789c30bd58f1c4cda19061fa461ea1db1d71f90abfdd74fc9441ee084235317d26439e94b7711dddeeba1c6050c