Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
d71d356004985ae1fd4a26fd805e3abc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d71d356004985ae1fd4a26fd805e3abc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
d71d356004985ae1fd4a26fd805e3abc_JaffaCakes118.html
-
Size
117KB
-
MD5
d71d356004985ae1fd4a26fd805e3abc
-
SHA1
64bc6809248c646fc9ddc27b033a6dcfd4d31308
-
SHA256
c89d7e69b72d703c09e0e8bf2d92e8178936d59431c3d55b5c462a361eee88bf
-
SHA512
086103de683a98b97b128fd77f18d13dde034df85a9dce20cc0748016eeec722f91bdfb452cfa593a6455d1f6b68fb4928b2d1b50525a39167cc129af88e1e27
-
SSDEEP
3072:TqVVCwo0/9gzeN2iB0IXP8m8dfFf9EdQodEhi9taQp53:uKe1ofs3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2892 msedge.exe 2892 msedge.exe 1936 msedge.exe 1936 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1924 1936 msedge.exe 83 PID 1936 wrote to memory of 1924 1936 msedge.exe 83 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 1824 1936 msedge.exe 84 PID 1936 wrote to memory of 2892 1936 msedge.exe 85 PID 1936 wrote to memory of 2892 1936 msedge.exe 85 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86 PID 1936 wrote to memory of 2284 1936 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\d71d356004985ae1fd4a26fd805e3abc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec77846f8,0x7ffec7784708,0x7ffec77847182⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11002379242955156729,12003105452079882640,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,11002379242955156729,12003105452079882640,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,11002379242955156729,12003105452079882640,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11002379242955156729,12003105452079882640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,11002379242955156729,12003105452079882640,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,11002379242955156729,12003105452079882640,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2020 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
834B
MD5542c95391cbcf256cfbdcdd9b482b9b5
SHA1ff1feb63134f4f6e31b1b1f25e51b9ea926ed2e4
SHA256ac9ff2eaf23490a24f48fa5c2eb78cb2d18b956216c106178d343d73f8e41e5f
SHA51243f9b121938891b6aafb3f66853d6c2c011f0f6f0f1970c0414104c3493dbd8c6ff1a900cf05b53625ee721b76a177fd03564a540aeaa9bc425cfc711e41e021
-
Filesize
5KB
MD5dad7d50159631a23f10bca234b0c7f54
SHA197dbc612c9d5de10212c85c7eef8935509d27fe1
SHA256113bac36f3250b2520a1b3bc1a271c07a33edc8b6c1e69b7e34d2e03c366961d
SHA5129de84f9b233a49f65a47e390ac71995f5fe0ecb509236ff8957e6bb90d62de2d7bc76e0876c98d5a55f1610a3d08e7c5a157ec7773ccac1e814c8669b688431b
-
Filesize
6KB
MD5097584620ac2816ff5904b6bf7099027
SHA17fa3b3860351ce2f93926b192b1861c3e8c0b43a
SHA256a136b4d04f041c623aec1ba61282d89a7a92200b35b7469fc36dc410d3b03332
SHA512d348846787156033361f068699312f4b022153aa2ba7bb900e8f0558bcda6e68d0483a43a55102436a497720149e5720c78b5e284f60ffb76afb5a8035bacd81
-
Filesize
10KB
MD5d204c74f4aedd816e6244514804fda37
SHA1a6dc36e4032183515ba9283538db8aa5f574cb27
SHA25694b167a8830afa2b0b03f32edc6c7d6c7b353b0bbcaf57084f32116abc77e044
SHA5124c2c91d856e74172a210818504ddb4b0b5a35279b1b76ca79e4e644bf2b3da79385aa54eaf387096a7c63d029773db13c2edeecda0f70427d2989e86dd7d1cf3