Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/06/2024, 01:13

General

  • Target

    8c6c4d7409773856d2f535b8a87836b0_JaffaCakes118.html

  • Size

    20KB

  • MD5

    8c6c4d7409773856d2f535b8a87836b0

  • SHA1

    9daa270bb161308c53ace3ff77b7703700beecfb

  • SHA256

    91d6af97138fe3bf380a59bdebc81a4cf9e05f186cafc1793625e79383ebcf6e

  • SHA512

    3cf3e39ab487fb1ab0c41841e4728dd2d8b2dc42ee96f5afecd1cd5bb7c60d0ce336a5f117d32b75da81d4464e2e614205cbbfa57929cb1b693c49af57d675e1

  • SSDEEP

    192:SIM3t0I5fo9cKivXQWxZxdkVSoAIk4azUnjBhWY82qDB8:SIMd0I5nvHLsvWrxDB8

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\8c6c4d7409773856d2f535b8a87836b0_JaffaCakes118.html
    1⤵
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffda88e46f8,0x7ffda88e4708,0x7ffda88e4718
      2⤵
        PID:3472
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,5703368225187378910,6274621117661560169,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2260 /prefetch:2
        2⤵
          PID:4488
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2248,5703368225187378910,6274621117661560169,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:3
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1696
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2248,5703368225187378910,6274621117661560169,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2692 /prefetch:8
          2⤵
            PID:2332
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,5703368225187378910,6274621117661560169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:1
            2⤵
              PID:864
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2248,5703368225187378910,6274621117661560169,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:1
              2⤵
                PID:468
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2248,5703368225187378910,6274621117661560169,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1712 /prefetch:2
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                PID:1692
            • C:\Windows\System32\CompPkgSrv.exe
              C:\Windows\System32\CompPkgSrv.exe -Embedding
              1⤵
                PID:5080
              • C:\Windows\System32\CompPkgSrv.exe
                C:\Windows\System32\CompPkgSrv.exe -Embedding
                1⤵
                  PID:3232

                Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                        Filesize

                        152B

                        MD5

                        ae54e9db2e89f2c54da8cc0bfcbd26bd

                        SHA1

                        a88af6c673609ecbc51a1a60dfbc8577830d2b5d

                        SHA256

                        5009d3c953de63cfd14a7d911156c514e179ff07d2b94382d9caac6040cb72af

                        SHA512

                        e3b70e5eb7321b9deca6f6a17424a15b9fd5c4008bd3789bd01099fd13cb2f4a2f37fe4b920fb51c50517745b576c1f94df83efd1a7e75949551163985599998

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                        Filesize

                        152B

                        MD5

                        f53207a5ca2ef5c7e976cbb3cb26d870

                        SHA1

                        49a8cc44f53da77bb3dfb36fc7676ed54675db43

                        SHA256

                        19ab4e3c9da6d9cedda7461efdba9a2085e743513ab89f1dd0fd5a8f9486ad23

                        SHA512

                        be734c7e8afda19f445912aef0d78f9941add29baebd4a812bff27f10a1d78b52aeb11c551468c8644443c86e1a2a6b2e4aead3d7f81d39925e3c20406ac1499

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\6c950c90-7aa4-48fc-af59-f557949453c7.tmp

                        Filesize

                        6KB

                        MD5

                        665689bce5c21ffd5f1d6794ec4d4a84

                        SHA1

                        091c5839cc943c0a8d5dc8c55dd1e395cc018087

                        SHA256

                        d4ddd675ebc6b327caed38ca009531f67a322dd7ee6ce992ac3a7f119ce5c89e

                        SHA512

                        02cd8871e1dc3dad176dc1bbc8a0d340627ce951b6a79e3f950b68d3785f9890a5f6da129fe2b5b0a558214fb4be8475bb94be648899e910d90bfc533a7577e5

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                        Filesize

                        5KB

                        MD5

                        3ba52adf235cd4a26f3292edf2fe10c7

                        SHA1

                        05b8c963635f25db3fb9e0c749622e7cdf6bf20b

                        SHA256

                        b8c5293e9b5687919136bb8b8836316a2c42666fa781d1e9e894f7436f12d115

                        SHA512

                        d8a1efd2e4d23d493ed2c8e105a81ffa5995bb0c886b7d97dc5098aef06bede92974645247d99dfc0d5fa1b2e25a5fc99f3a52faf383fbd884a735a1fc1b0927

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                        Filesize

                        6KB

                        MD5

                        3416575a48a74c9ba0f54700d7612f87

                        SHA1

                        c35002c031aff90505c332e6d29b919035c16d6e

                        SHA256

                        49bebd791df9d7b83b5ad3740d5b5046274f43a8cad0973eab67a80aaf5c8ea7

                        SHA512

                        61b30d7f0544e886af8a96721f3c1fdda79f40af704e3df924dd522ff778388b0b3f8869db8fd14848512ca7f4293147d9ae28b172c035a9c4b690882e8e57fa

                      • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                        Filesize

                        10KB

                        MD5

                        6c8a256b1260ac67b594476799e6e5e7

                        SHA1

                        845f430dd9880cbaa79a699f539fe19068520fbd

                        SHA256

                        f9bf8da65bad68ed6895b095c9983e0ad4c53272679d3bf2363349b1ffb95745

                        SHA512

                        8b7a0cbf1ed28ad7b4440ca038839551c1c3e1d442289e42bc9e738dce02e51056a9b1852bb79cb7c694c24f2d0db373b415f975f03cd06a4187f6442d9c06a2