Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 07:17
Static task
static1
Behavioral task
behavioral1
Sample
dfb925dc17bb3af60191419867c5811a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dfb925dc17bb3af60191419867c5811a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
dfb925dc17bb3af60191419867c5811a_JaffaCakes118.html
-
Size
68KB
-
MD5
dfb925dc17bb3af60191419867c5811a
-
SHA1
be1242fb39e911befc5df4629d3be3b99abe9467
-
SHA256
0f6a862c2b6a8eba4349c3c4d12ddc1f6755076b5336c761529a4a3fd8b4695c
-
SHA512
6319002990c32b21d1bff0027555d777076fcc307a0b8cf1931ed9a946d2ee3af3c87da8069540dea0ae4d7a7a2bd20d551c2e3cba171c23b9e03d6cfbf97f79
-
SSDEEP
768:JipgcMiR3sI2PDDnX0g6iPx9wwtRoTyv1wCZkoTyMdtbBnfBgN8/lboi2hcpQFVh:JzLzwwtmTcNen0tbrga94hcuNnQC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2620 msedge.exe 2620 msedge.exe 932 msedge.exe 932 msedge.exe 764 identity_helper.exe 764 identity_helper.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe 556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe 932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 932 wrote to memory of 836 932 msedge.exe 83 PID 932 wrote to memory of 836 932 msedge.exe 83 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 4788 932 msedge.exe 84 PID 932 wrote to memory of 2620 932 msedge.exe 85 PID 932 wrote to memory of 2620 932 msedge.exe 85 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86 PID 932 wrote to memory of 1824 932 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\dfb925dc17bb3af60191419867c5811a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf89b46f8,0x7ffdf89b4708,0x7ffdf89b47182⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,12865835754159057836,3356371856170595632,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:4788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,12865835754159057836,3356371856170595632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,12865835754159057836,3356371856170595632,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2892 /prefetch:82⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,12865835754159057836,3356371856170595632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,12865835754159057836,3356371856170595632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,12865835754159057836,3356371856170595632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,12865835754159057836,3356371856170595632,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,12865835754159057836,3356371856170595632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,12865835754159057836,3356371856170595632,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4720 /prefetch:12⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,12865835754159057836,3356371856170595632,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,12865835754159057836,3356371856170595632,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,12865835754159057836,3356371856170595632,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3924 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:556
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD565cb5c641acb1fd98ef46f5ef9739296
SHA1a99f38b9fac139f870815cc85b02b46f5d1b44d4
SHA2560a9cc74f48611f31dbbdabeaf533e4f41913dac2acf07fd3dbe131808976aed8
SHA512b79db4d1e0d93ec999098c3135a3d732489c9cafc039d2a2e5487e7e40daf08505f3a41be6856707eaafd240e136725bf75f62f14976f56badc49b2733e9237c
-
Filesize
6KB
MD5cc1399ce7dfa9d360e4c6403e6dae509
SHA1e5eaf01e1e7b61d5645c89d983e1c1b4aa317c9a
SHA256b6e1d9b0a9fe2658e158469e32ec2c1cb27119b652675a7be2e5875a929ebf84
SHA5120b6ab00caebb6ee66ea036a7ced0fb011a641c948c0f756f8a7d7ba2a1ca29e6a3db264023e2e36c8405945089a4858d619388d2fd59f64c155cb688c8121765
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD593630b468d31b1d7e037d073ecba5626
SHA1ac7f40d3b2a1554fc8f716c8c11e4c7f88921020
SHA256d506c58e2abf5759069611e64610a2213a7140c39a881d563079811758607736
SHA512e5ac8d66605515c81079bd9d65baa231531391cfc533e9ce94dbe90d9650b4beb9d949b00c8bb120ec7bf649cebe58b04d26ddd909dbcc815ac6074b3bd0a62d