Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/08/2024, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
96ec714d60d6c87b741cbf7b876eb2a6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
96ec714d60d6c87b741cbf7b876eb2a6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
96ec714d60d6c87b741cbf7b876eb2a6_JaffaCakes118.html
-
Size
41KB
-
MD5
96ec714d60d6c87b741cbf7b876eb2a6
-
SHA1
488cf65a2a8e66870835eb0e5ab60fbf6dff719e
-
SHA256
6d97dd750d89f98f7732d98630008e20d97e8e398f3b5f99831d4f873fece45e
-
SHA512
a93d9be3c3fb4455e5e36efbbd079e5e8f7c86294b4fe7ea98ade41d9bb8313a32ca1ec95eae127de51ca6f2c008ba983852681db621273c3d991198950cb20e
-
SSDEEP
192:uw71b5neB4pnQjxn5Q/snQieHNnfnQOkEntginQTbnBnQmSLxbYiaouPejQ9zdP9:+Q/sUxkilaS0E2Cd2Hj6ben2RAAEGD8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3384 msedge.exe 3384 msedge.exe 2736 msedge.exe 2736 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe 2856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3812 2736 msedge.exe 84 PID 2736 wrote to memory of 3812 2736 msedge.exe 84 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 2252 2736 msedge.exe 85 PID 2736 wrote to memory of 3384 2736 msedge.exe 86 PID 2736 wrote to memory of 3384 2736 msedge.exe 86 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87 PID 2736 wrote to memory of 1188 2736 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\96ec714d60d6c87b741cbf7b876eb2a6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa0b4346f8,0x7ffa0b434708,0x7ffa0b4347182⤵PID:3812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8611701600550815475,9703119686166517489,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,8611701600550815475,9703119686166517489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2132 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,8611701600550815475,9703119686166517489,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2792 /prefetch:82⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8611701600550815475,9703119686166517489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8611701600550815475,9703119686166517489,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8611701600550815475,9703119686166517489,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4824 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,8611701600550815475,9703119686166517489,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5996 /prefetch:82⤵PID:3308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1784
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
6KB
MD506ac5104d58dbe2abff41b6ff0860ce7
SHA11549f38d094a0b2bea744118d464124d341c5a7c
SHA2561e51f07c7d36335be734b3f514d9d4d2cea8f2b5f879d6efe76c9a206517af06
SHA512170a45a6228daf4213ff82d60ade848c8e7577c7771a894d9728cee13dc2224f80edd592e7da2d7a96ac6a4df7733f55bf77e5c2adcd8addf0dc12d6d89532c8
-
Filesize
6KB
MD5bee7049d7b3db40802efd60cf92f7279
SHA1a0fc6b57a78e7ac9bdf75ecdf95c3667af7bc0be
SHA2569d6392c35dbc470bc9f465978b049686b8e0682da5069e304e40ac523677eb88
SHA512202afe095162b937dc931ef7d77f45db56770a6e2f527bd231b8858cfa5b1e114e002385a5b74f282ce4b594171ddec934d769375e3ad4070eb231b3fc23f031
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53ff46f9a56c741ba18be679a2847c92e
SHA169530b2ffaf0aa256e4b667a1c6d8df27ff4c21a
SHA25624f1431e3c49995200c326a8a49184505b5f2887b6da0aa27a96c2c5c7aef9fc
SHA51232c290daa5b2cf8cfaec8d3de1098af70579d6de60ec2eae55684631c49836812251b18bfca854f638f3ead4017971b697d307a43ef23ab2caec4bc996c30473