Analysis
-
max time kernel
139s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 16:11
Static task
static1
Behavioral task
behavioral1
Sample
d7e8ad46bde4b1f6d2602ad026abf65d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7e8ad46bde4b1f6d2602ad026abf65d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
d7e8ad46bde4b1f6d2602ad026abf65d_JaffaCakes118.html
-
Size
155KB
-
MD5
d7e8ad46bde4b1f6d2602ad026abf65d
-
SHA1
bff0b65bde79ba070574588e243d52346f4b20e9
-
SHA256
10494b839319831f9c9b7883da670b8b53761ab600ab443314669b74b40d3386
-
SHA512
cc3d18237cdec0910cab3d1fe1d576cb8fd3f62c6c4ac687a19ae1643c33901f35b0254ee2a7380cf560f3323c07a7f1b0e2f3060040f039404be68f0474f423
-
SSDEEP
1536:iSRTegPp5fRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:ig/NRyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2476 msedge.exe 2476 msedge.exe 4600 msedge.exe 4600 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 5020 identity_helper.exe 5020 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4600 wrote to memory of 2920 4600 msedge.exe 83 PID 4600 wrote to memory of 2920 4600 msedge.exe 83 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 4472 4600 msedge.exe 84 PID 4600 wrote to memory of 2476 4600 msedge.exe 85 PID 4600 wrote to memory of 2476 4600 msedge.exe 85 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86 PID 4600 wrote to memory of 864 4600 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\d7e8ad46bde4b1f6d2602ad026abf65d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a7b946f8,0x7ff9a7b94708,0x7ff9a7b947182⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2201126381948395370,8004445987633297828,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,2201126381948395370,8004445987633297828,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,2201126381948395370,8004445987633297828,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2672 /prefetch:82⤵PID:864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2201126381948395370,8004445987633297828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2201126381948395370,8004445987633297828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,2201126381948395370,8004445987633297828,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3100 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,2201126381948395370,8004445987633297828,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,2201126381948395370,8004445987633297828,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4780 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2201126381948395370,8004445987633297828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2201126381948395370,8004445987633297828,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2201126381948395370,8004445987633297828,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,2201126381948395370,8004445987633297828,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4896
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
6KB
MD5b0aad6813a37492dee82ab720caabf01
SHA1f278d2660cdd17a51e3f4939a02fdc0a100a83cd
SHA256836d32ff6f30db3c0893a0ace7dac593db9ad57ace7287cc6b525ee2a3133767
SHA5121c6725a22a148cfc1b4bd42ac341dfa14efeb72ea75a62882f62b10f3380b9127f47dbc71b6232e46b1614e0531f25434a207dd3bb3b268c1d5fd3d17068b021
-
Filesize
5KB
MD52edacfe1efc827cdc105ee96f8c5b88f
SHA1b8d3caa03f017d949af386159ee12b45e2642a65
SHA2568edbc46f06b3ce8b1a8bff16e68cbb1ce86fe6a08723006ae397a846852f7e5b
SHA512398d206120a13ac52c3c8d32067cb714bf2c168f26aaa526647f47ba20b9d43ed4d6a0620394e594be4218834a2f5596f38532bc46089a53e9f8ddaa4a928d01
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55b87dbf1957242ed8ee3c803f6e1bb99
SHA13ea9ae4dca1e5618946a04d90eaa7b86fd71590c
SHA2563db3c0aaa5d14bc84edc9824c31d6f46b62786997ff0cda7c7a99e9158b3c7a1
SHA5129030f8b053755be74dbe5457adf68209857f6860f369a0d7a1980fad7d5eab201222148fd7737ac46a07ba2df55af564b50bc36461e14afae1d7953dd5e9a3b1