Analysis
-
max time kernel
137s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/08/2024, 15:31
Static task
static1
Behavioral task
behavioral1
Sample
93ad8c1d8390b62e06d252a43aec219f_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
93ad8c1d8390b62e06d252a43aec219f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
93ad8c1d8390b62e06d252a43aec219f_JaffaCakes118.html
-
Size
6KB
-
MD5
93ad8c1d8390b62e06d252a43aec219f
-
SHA1
b08d357ecbf6c7c19427112d3a543370c5c9c544
-
SHA256
58a43ea12b4f49321a7d39fb04e0629f9aec2bf9276d1668a8864949491d386b
-
SHA512
897d9ae7ac252de0a4d4a2274170c9a0c204b9da27543fbdf4ccc6b20dc74492ac29807ba943835d9ead29413836a1a0943454ca12566d741160bd7016c37dae
-
SSDEEP
96:uzVs+ux7wg0LLY1k9o84d12ef7CSTUOeAXwcEZ7ru7f:csz7wg0AYS/rXwb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2260 msedge.exe 2260 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4928 msedge.exe 4928 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe 4928 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4928 wrote to memory of 1360 4928 msedge.exe 87 PID 4928 wrote to memory of 1360 4928 msedge.exe 87 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 4072 4928 msedge.exe 88 PID 4928 wrote to memory of 2260 4928 msedge.exe 89 PID 4928 wrote to memory of 2260 4928 msedge.exe 89 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90 PID 4928 wrote to memory of 1612 4928 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\93ad8c1d8390b62e06d252a43aec219f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff5a8746f8,0x7fff5a874708,0x7fff5a8747182⤵PID:1360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,12045550027137485229,9866628299378499412,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,12045550027137485229,9866628299378499412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,12045550027137485229,9866628299378499412,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12045550027137485229,9866628299378499412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12045550027137485229,9866628299378499412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,12045550027137485229,9866628299378499412,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4732 /prefetch:22⤵PID:1260
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:728
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
6KB
MD58a5e4c7f347e34b96c75cda90efbb4ba
SHA183b32075b53da8743802f37a287df687e2c3056b
SHA256d67e22034b742e7c03885037bdc5b2402b98c9efc627d4d41ce3674356c983d4
SHA51259e6ac39eecce04f6ce1a69d2b3ca8648eb3823fb4c1fc7ac73442ead2de822195bbe85e21e1ae4de21e90ea79d5bcf161cb06fabd79e99f06f162d74a1391d4
-
Filesize
6KB
MD5b616643f0f3b80f19bdba6f6b165efa9
SHA1af58c7c274efcebc3b5885e9aab18c8b2d7b22b0
SHA256a4c4f602f9f755f7cb46db0abb2d008548a739d1b15f0f05a5b4e5547b93ae1b
SHA5123e11fd0335ba2e8b2e1163101d726e52560c61bba70d5f2dd5e7a5c13ff2aeab0aee7978daac66713817321d186f7fd257c98ebe965bb7291e1c29aab9e3e5f2
-
Filesize
10KB
MD58a97a071739111aced2e2bdc4468accd
SHA100eea6c73bad4fbf2b107d9790466782e582eb32
SHA256469aa3b99cb4517b57221f1055f2e860767fb4ac6c4ef0a6731daca59612339b
SHA51202b357e894f2ddaae658639af10147c172508011b3fc27122e2eeac9db2a80bea43a7ab82d98e1335884c19ac8ecbd7a68c486e00c3e220162552aa767f655ec