Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
963403a6a0d6ebe62b3b4ebe36b92cb7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
963403a6a0d6ebe62b3b4ebe36b92cb7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
963403a6a0d6ebe62b3b4ebe36b92cb7_JaffaCakes118.html
-
Size
28KB
-
MD5
963403a6a0d6ebe62b3b4ebe36b92cb7
-
SHA1
6c702fbd7adc177a09c72b9b949df6fec14aae01
-
SHA256
26f431af0aaf468b4bd1b207624cb222fcde94ab3eca290fefcd73b314738c20
-
SHA512
81b65d7a755415f522c1e7c2096487faed1b9ab19a540de58c85669e2b87d96a146b3254305458058dd9f7b2332b9e8e656ef99e8b9c2545ed2eef3fa7d049b6
-
SSDEEP
192:uwX4b5ngbmenQjxn5Q/mnQie1NnfnQOkEntGcnQTbnJnQ9exhm66z1eSJQl7MBVp:8Q/rMLs1ebSlV
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1664 msedge.exe 1664 msedge.exe 3424 msedge.exe 3424 msedge.exe 2348 identity_helper.exe 2348 identity_helper.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe 4424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe 3424 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3424 wrote to memory of 1644 3424 msedge.exe 84 PID 3424 wrote to memory of 1644 3424 msedge.exe 84 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 4048 3424 msedge.exe 85 PID 3424 wrote to memory of 1664 3424 msedge.exe 86 PID 3424 wrote to memory of 1664 3424 msedge.exe 86 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87 PID 3424 wrote to memory of 4344 3424 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\963403a6a0d6ebe62b3b4ebe36b92cb7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8540646f8,0x7ff854064708,0x7ff8540647182⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3765677920589991258,9495242146941548437,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,3765677920589991258,9495242146941548437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,3765677920589991258,9495242146941548437,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2728 /prefetch:82⤵PID:4344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3765677920589991258,9495242146941548437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3765677920589991258,9495242146941548437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3765677920589991258,9495242146941548437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,3765677920589991258,9495242146941548437,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5172 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3765677920589991258,9495242146941548437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3765677920589991258,9495242146941548437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3765677920589991258,9495242146941548437,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,3765677920589991258,9495242146941548437,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,3765677920589991258,9495242146941548437,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2968
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
6KB
MD540066fb9c67bd86597cb3b6ce972920f
SHA16f3c8c58a2bef309fe91e68b26621176d5b4ff4c
SHA2569db90d978dc3345a252050af0c73a30fda8e8b446b40bd514cb0af7e7df1d310
SHA5125be6648d939b7fce579d126ee0bd39b201c8c1a8a0e1fee076169d3b5a7d886a9b549302d764094cc8d3d68d137cf179adc458168c947d38e9c96edccc34f8dc
-
Filesize
6KB
MD5b14ed7866b5e4ecc8e9c49de220b6d0d
SHA175cf3d0ad4e682d6657599e5bef7300cf151cb81
SHA2562a0540c094b8706a5bf6f374bb197ed2d0ba9d5c387e5c2f1a030d9fbeddf668
SHA512ff21b356dc6101b492a51487d04e9e51ede5f8f3522ebb1179425250e11f51f13808f20fb342e5ccaad53edca4b9a7cd4d6d24365f66773b4bbe5cfc0eed2d2a
-
Filesize
6KB
MD531322797e17b41123051f08e3e7ed25f
SHA1ff090f4944df6c9a47fff982d61cc6b521edc7b2
SHA2560a79adb1d8263bfa484d5fb3bff4905ac03b3b70e6d877eb767e1fb5218296ee
SHA5126ea917510cf5bba41df52bbde62fec85ed5f344a696eda8ff76e010b4ded86c65154830521d9792e97ee9b02b50dad22b30d20e8540b2b9063f95940ad0a40bf
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5463fe76741c3733508e79e01f43c1ed3
SHA14a0c7f3a48034611d99cb042edf9ecb203b2328c
SHA256372bb03f51d2444c316c7078cd35da4def6fa2cf2a0e41ecd4264777fc446a4b
SHA512892f8db9c2873c33c2f6dda73ba73bfc6349fc79b558034efa9c9231d25c3ed63980f35cac08e91ab095ec13550f5d7b031c2f60d362f41caed9d89498d7f4c4