Analysis
-
max time kernel
145s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 19:11
Static task
static1
Behavioral task
behavioral1
Sample
02de572b850c96ab6d45879cbf1ae5c9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02de572b850c96ab6d45879cbf1ae5c9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
02de572b850c96ab6d45879cbf1ae5c9_JaffaCakes118.html
-
Size
117KB
-
MD5
02de572b850c96ab6d45879cbf1ae5c9
-
SHA1
d333014679afc4860491793fd1a3a7b413145ad1
-
SHA256
1d088441191d5ebdd70ce6abbe5096ab02334f7e7dc79420b03a75a46cd4d9a5
-
SHA512
a159d76601dcdd8389a2210eeeb0bb304b6b850aca5d39949e7b216786b2408b42e96b2dba5807d470844ed6a9d9667f063c25aaa353af342b169e34b27363a6
-
SSDEEP
1536:SgmisIyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dK:SuyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4472 msedge.exe 4472 msedge.exe 3064 msedge.exe 3064 msedge.exe 1132 identity_helper.exe 1132 identity_helper.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe 2708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe 3064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3064 wrote to memory of 812 3064 msedge.exe 82 PID 3064 wrote to memory of 812 3064 msedge.exe 82 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 3316 3064 msedge.exe 83 PID 3064 wrote to memory of 4472 3064 msedge.exe 84 PID 3064 wrote to memory of 4472 3064 msedge.exe 84 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85 PID 3064 wrote to memory of 2256 3064 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\02de572b850c96ab6d45879cbf1ae5c9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff204346f8,0x7fff20434708,0x7fff204347182⤵PID:812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,11674430437924130297,14035616392659014728,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,11674430437924130297,14035616392659014728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,11674430437924130297,14035616392659014728,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2828 /prefetch:82⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11674430437924130297,14035616392659014728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11674430437924130297,14035616392659014728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,11674430437924130297,14035616392659014728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 /prefetch:82⤵PID:1468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,11674430437924130297,14035616392659014728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11674430437924130297,14035616392659014728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4168 /prefetch:12⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11674430437924130297,14035616392659014728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11674430437924130297,14035616392659014728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,11674430437924130297,14035616392659014728,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,11674430437924130297,14035616392659014728,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1720 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2724
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6663e66a-dece-47b9-9a7f-8e7a61dce41d.tmp
Filesize6KB
MD56a6e75a9add0e24b5fe78e0e28415162
SHA104913c6113d26101f1cd3f5ca085931aa678ff30
SHA256dcb5234f6e3e23025f915e18e64ec219c549fbfbd95e593e79a8e642aef052e6
SHA512b218ba50ecac51503c1a0469f36a8699f7fa43bac013c6e8654054e4430fb4bae6c27f01f63eea9fa9e0bf10c39f5eabdd0cc3f424cbf8c65d1948a7f7fdda9c
-
Filesize
6KB
MD5cf89f79e66856f7c75d970c00668a0da
SHA15abb005aebb1d01e936de936bf4c87ebc848f958
SHA256da11e52e4c0804e902b69be0781968eae727eece5891da900c65470e821b8453
SHA512a0575e19bad8a8b7924dfd6cf7a4e98a386ecb0c8484b94e44b19164a7556efb5e9fd3f675ab621808c3809c300c62861d4bb42e793adbe8594985007188eccf
-
Filesize
5KB
MD54f1c854e943f7f8112d5d07f3851e661
SHA1159aaf89617b8d55a6529ba0e5604a889461a2d3
SHA256ce1b7cb0dad516ce1fca2dba705dd6c2567f0fb863e6c5e93a6629ab9fc70c7d
SHA5128e7ff65e96cfc101cd6e01d4a75df62b1b165354f1238f4aea67abff617fe81fbf9fc77297f4c45f63ccc517503fd16a1b624eadc155e3d253f1358784b0a43c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5723803d82b4b09b65881672ee27efc20
SHA14af6ca0c91115f82e3013293d4ab65c8cc7e4065
SHA2565a7c14edb621a605b49f8c07728e4dafb2423bde3f177d1beab16346028c835e
SHA51203cac83c266df1a4085da87005b9faeee0a34d16e5c976cf867f4df396b4d482d8f639032743d5d4d2810149b26630b30339baa8a524b5c43624876fc6929efe