Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/05/2024, 14:00

General

  • Target

    638a009a8203a60d43d1fc0b00296cc9_JaffaCakes118.html

  • Size

    17KB

  • MD5

    638a009a8203a60d43d1fc0b00296cc9

  • SHA1

    39bc42fdc7adcb295c0f787f4c42cf71f4435735

  • SHA256

    1e22e23715976a103200da4aacc358e53d3d4c43cdfc1a7bc538295f38d1bf64

  • SHA512

    03c84636d41fb5989dfa5b5ff0d6b5c83911326116d294e411833822bc83183a0b9ea4d7d52a471970dd11c73cf9c809db4a3e4e4a42b673b130a4686694b007

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIg4yzUnjBhmY82qDB8:SIMd0I5nvHPsvmrxDB8

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\638a009a8203a60d43d1fc0b00296cc9_JaffaCakes118.html
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3188
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa270646f8,0x7ffa27064708,0x7ffa27064718
      2⤵
        PID:4228
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5476188345090971390,3534743577244226287,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:2
        2⤵
          PID:3488
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,5476188345090971390,3534743577244226287,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4588
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,5476188345090971390,3534743577244226287,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:8
          2⤵
            PID:2404
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5476188345090971390,3534743577244226287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:1
            2⤵
              PID:4244
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5476188345090971390,3534743577244226287,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
              2⤵
                PID:2856
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5476188345090971390,3534743577244226287,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1716 /prefetch:2
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1380
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:1620
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:2880

                Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                        Filesize

                        152B

                        MD5

                        1ac52e2503cc26baee4322f02f5b8d9c

                        SHA1

                        38e0cee911f5f2a24888a64780ffdf6fa72207c8

                        SHA256

                        f65058c6f1a745b37a64d4c97a8e8ee940210273130cec97a67f568088b5d4d4

                        SHA512

                        7670d606bc5197ecb7db3ddaecd6f74a80e6decae92b94e0e8145a7f463fa099058e89f9dfa1c45b9197c36e5e21994698186a2ec970bbdb0937fe28ca46a834

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                        Filesize

                        152B

                        MD5

                        b2a1398f937474c51a48b347387ee36a

                        SHA1

                        922a8567f09e68a04233e84e5919043034635949

                        SHA256

                        2dc0bf08246ddd5a32288c895d676017578d792349ca437b1b36e7b2f0ade6d6

                        SHA512

                        4a660c0549f7a850e07d8d36dab33121af02a7bd7e9b2f0137930b4c8cd89b6c5630e408f882684e6935dcb0d5cb5e01a854950eeda252a4881458cafcc7ef7c

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\9a192a79-e1f9-48b8-b57a-303c93433795.tmp

                        Filesize

                        6KB

                        MD5

                        a7fed70cfb33b34498a8d1220998369c

                        SHA1

                        32162ec07b9e03c6ddaf1bf412aacf95f5a8b3ee

                        SHA256

                        626a8bc136ad486a05dfd30b7a1e9b2ce0d48743e4420e6985e0e2e279080bf4

                        SHA512

                        04b385e14400fcb72d4a70651e50f5ba55ff1f49a81e37efbd2549483fd6972e7cc40e9c8de30a131236489bd2ca937c6780d063d582739d0a8d8168460656eb

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                        Filesize

                        5KB

                        MD5

                        4077c09972150c8ebba8b8868599e91a

                        SHA1

                        3abf9bc65f897fccaec1e2667ffa50284e199b67

                        SHA256

                        94baa70a555d5e861e1c02d2d7562f0a88ea16cb6cb7e74edc4976d6d0bad205

                        SHA512

                        753d0dde7b18fe1d6f0b8012097d517b75a23c91937a967756ae7af8ef32c4b0176d18c4cd99219b4496bcb613a3b6ccf008d7d2eb6cb9237aeec37a50030f4c

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        f27de418b6d9e0a837790464363f6a62

                        SHA1

                        4b129d1188434d00b67ccf3d4a0c0f1c457c265a

                        SHA256

                        12508c6d9b9a67fdc9b1a450c9c200eb69acc3f6b11a85c7f1dc4579a6de1514

                        SHA512

                        ec3b36d677f5982c3839927a9c146a262a2ce10ed68006287ea686982f59269fc04503938ed0f974465f07c3d4bd836921d6d554e7318be7158198cba166934c

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                        Filesize

                        11KB

                        MD5

                        7b275cdfa9c33901e41a8c000801bd08

                        SHA1

                        92c43d1a31b2ff7addd1a14c7bb51beff0f1ea53

                        SHA256

                        cd25bd30898a08ae7a58727109f4dfed16358e3fdaca8afa96aefba1f69249be

                        SHA512

                        5e1b672fa25b1a007ad6a28ee4f520ec3239a15bba006ff06b5566c9b07d24120ed0ae6967c5cb9c0cc2fb62213be20e35a65fb950d86857bfb1db93f3832d44