Analysis
-
max time kernel
139s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 19:48
Static task
static1
Behavioral task
behavioral1
Sample
db3f1feb014e41d3d834de4ccaa944aa_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db3f1feb014e41d3d834de4ccaa944aa_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
db3f1feb014e41d3d834de4ccaa944aa_JaffaCakes118.html
-
Size
155KB
-
MD5
db3f1feb014e41d3d834de4ccaa944aa
-
SHA1
08bab4a2eaf692cae90c8014d9fa1ec563e7c669
-
SHA256
45190d98e23eb2b442a6826e351b1905c4796c04b677f4c31783032576d148f7
-
SHA512
9421296d5cde49421ed049259dd11c8329792a4c1b99e5d23641960e2a79aac9d39837e5f771b2c3aec75a135d637ba5141309e823fa9127ec50d7e41d4c3a26
-
SSDEEP
3072:ismn+hqTpWJyfkMY+BES09JXAnyrZalI+YQ:iF+hqdWssMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1364 msedge.exe 1364 msedge.exe 2764 msedge.exe 2764 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 3392 identity_helper.exe 3392 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2764 wrote to memory of 1488 2764 msedge.exe 83 PID 2764 wrote to memory of 1488 2764 msedge.exe 83 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1948 2764 msedge.exe 84 PID 2764 wrote to memory of 1364 2764 msedge.exe 85 PID 2764 wrote to memory of 1364 2764 msedge.exe 85 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86 PID 2764 wrote to memory of 3340 2764 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\db3f1feb014e41d3d834de4ccaa944aa_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xb4,0x108,0x7fffd1c046f8,0x7fffd1c04708,0x7fffd1c047182⤵PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,17079239671176803561,13998523316955976753,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,17079239671176803561,13998523316955976753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2576 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,17079239671176803561,13998523316955976753,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2644 /prefetch:82⤵PID:3340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,17079239671176803561,13998523316955976753,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,17079239671176803561,13998523316955976753,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,17079239671176803561,13998523316955976753,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,17079239671176803561,13998523316955976753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 /prefetch:82⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,17079239671176803561,13998523316955976753,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,17079239671176803561,13998523316955976753,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,17079239671176803561,13998523316955976753,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5072 /prefetch:12⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,17079239671176803561,13998523316955976753,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6076 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,17079239671176803561,13998523316955976753,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1124
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
6KB
MD5236523caea93799590d2f2347e17e360
SHA196f22484f45f8c8838a794196d5096df409e74fa
SHA25655a4ec388d9a2ea54b01c52bd9185a9cb75087f9147dfcdb085a1376b154a377
SHA512f22a0115ebab2ecd22af9164ffe485711eb23726674ff945e2ed7a797b7e50a73d71e4f486933bfbc01d23a360e18a52c5e34cbe13aae970e2825b5e62f6158e
-
Filesize
5KB
MD5f399fcabd9f57e89b17607fa762a63c9
SHA11355171ed462c31f76f6cd176f5caf7992b7ef3c
SHA256ebe0b7a335865cbb565ff0d38e7a0519aea50efc65284ab97ff54a8cea501516
SHA51262581fc23edc1a61dc0751c38708774aa28c067e0ea6e068aa0637cbf0f8acf52ffb89ffcac701023ef99db103658b334a8e000f8bf50b5ea0c1361ddecdfad8
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5600f077bdf0b7b32165aa704704d0e07
SHA110d476c88c6e5a312c6ba74d7593c5034703a591
SHA256bdbde0c49522c81267339eba0108d053d0d7c73d6d400cfc72dc5a3e4ce29b47
SHA512708f2a3997d0243b9c5d5eb916ccbaf00587e0dd4e17c82829086902f1884a97609da6f1506adbb4ef16064dd69ad2543ca92d602005dbb44966c7ab990cbd49