Analysis
-
max time kernel
145s -
max time network
111s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
0037fc6b2c9169a0b105d27e0300279d_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0037fc6b2c9169a0b105d27e0300279d_JaffaCakes118.html
Resource
win10v2004-20240709-en
General
-
Target
0037fc6b2c9169a0b105d27e0300279d_JaffaCakes118.html
-
Size
156KB
-
MD5
0037fc6b2c9169a0b105d27e0300279d
-
SHA1
eaf6f50508c3c271d180572cb45974a5342d41f3
-
SHA256
b450b08cc95de72bc206540e03fab24525badd66ac3bcd1cfeb054f798870f7c
-
SHA512
8bff24873e67a2b1d90311a94d78750cebe3b7c29b8a884d3bd9b9d058c006db71efc863cb38786783380eaa6a88a86f7f63bc2f81ce09fc09a1676dfc416b1d
-
SSDEEP
3072:sR34kqKpxcTgFtkHiB8pTT3Enk+o/nTyH99Gx1OaXQaVd82b:834kqKpxygFtkHims9SR
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 106 drive.google.com 107 drive.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3992 msedge.exe 3992 msedge.exe 3532 msedge.exe 3532 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe 2580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe 3532 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3532 wrote to memory of 2940 3532 msedge.exe 84 PID 3532 wrote to memory of 2940 3532 msedge.exe 84 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 4372 3532 msedge.exe 85 PID 3532 wrote to memory of 3992 3532 msedge.exe 86 PID 3532 wrote to memory of 3992 3532 msedge.exe 86 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87 PID 3532 wrote to memory of 3260 3532 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0037fc6b2c9169a0b105d27e0300279d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbcf3246f8,0x7ffbcf324708,0x7ffbcf3247182⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12361579703448912018,12157562601378474503,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,12361579703448912018,12157562601378474503,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,12361579703448912018,12157562601378474503,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12361579703448912018,12157562601378474503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12361579703448912018,12157562601378474503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12361579703448912018,12157562601378474503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2740 /prefetch:12⤵PID:1252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12361579703448912018,12157562601378474503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12361579703448912018,12157562601378474503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12361579703448912018,12157562601378474503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:4168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,12361579703448912018,12157562601378474503,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5736 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,12361579703448912018,12157562601378474503,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5512 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD52f842025e22e522658c640cfc7edc529
SHA14c2b24b02709acdd159f1b9bbeb396e52af27033
SHA2561191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e
SHA5126e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05
-
Filesize
152B
MD554aadd2d8ec66e446f1edb466b99ba8d
SHA1a94f02b035dc918d8d9a46e6886413f15be5bff0
SHA2561971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e
SHA5127e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994
-
Filesize
2KB
MD5b723a8459d3ac444a6a4c1cdec035ef4
SHA14e75aa0e10087ae3aebb923bdc0bebf5b91c4d13
SHA25654fa1d773fe564ac6fb91ffe4309a997814a9791247d85319027763cd6402a2b
SHA512d680296c2e82f97aea4f3dc69d62237e4c4085248880f397bd8fb8c94a47a554babc7bef730e3434f9933e69b6399003b9c34be6ac332f89f47fd8efe4f0bdcf
-
Filesize
2KB
MD5cda5237a785e81fd1250891745d55f0a
SHA121040ce92cdecf7a5c9540c1f9852478576aba21
SHA2565c3406a75c3890a12f8d1e97e166ed708a1036f1889c69b497e1813f8d4af087
SHA51242a34b6f04cd2b5f0f1fdd0f6ad4a950cb3cc5ef13628bc33d2043ce6e8c20bc3f46e836d616da94cbcb88dec56c042b76c90a352c8534b97559ab5036dad04c
-
Filesize
5KB
MD5ef25f212a1da8e31576549fce5847d7b
SHA11cd7f2be2718e594747bb58acb2d7c98ecc037bf
SHA256964ebd63414e7a51cd820f2e8a655e7cf827a027675fe04bb1c08a9ece67eb71
SHA5125f44e58cc75e6ac5f82696843df89957322f76c2caec8bab4c2f7ddf762340a038ecf1363755f470f8c18189546e03cf819f0bb743fab292183261aa0a14fd2c
-
Filesize
6KB
MD5717769822d7ade5280056aa82086fff7
SHA1aa4d5f0ef5e30a24a684558cd5b285dbf94c5fc0
SHA256bf918dbe100a0764389beb0e24fbba28e6511dc7e27ebe650659cb4e59a0a092
SHA5124e5598ffb0bd3cb54c8fa3f975e9349de323c694a40248ad85c08a74a4c065ec86f37df8c34286af69c7beaf6cda1e83317c13ba9f8c83fa52f49cc1a4574342
-
Filesize
10KB
MD55a6ee7516b6c64267710f8d65757c0f8
SHA1b4a79412260d16aafad598f2cb6dcf7468f51e80
SHA25652ead188b10646fe12322665689b8a0b169231ffa961dccb1ca484d3366dac32
SHA512b31cea277de4f2b1d3fcde04465410ee0153ccf7a66d05584e1d76019a3ca39c9d18cdb6163fe1ea96e9e94e3cfaa00d313975cd328096a124a289da7930dc4d