Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16/08/2024, 21:00
Static task
static1
Behavioral task
behavioral1
Sample
9feaf21a6edf654d213a59df4a1919e9_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9feaf21a6edf654d213a59df4a1919e9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
9feaf21a6edf654d213a59df4a1919e9_JaffaCakes118.html
-
Size
176KB
-
MD5
9feaf21a6edf654d213a59df4a1919e9
-
SHA1
fe159399aa2272795703dc7e64ddbdd962451579
-
SHA256
596c02885780d7adbcca765e93873ffc2c8bd13e211cf17690f6e08f10789ae8
-
SHA512
85a2ae418742b96584b3f031d8702d1c6e1469664d4797547bdb6c192790b437f4a4270e2f62ca27a9da32150a671468fb40d54c99d4f77a137f68037ef5973b
-
SSDEEP
3072:YT7tCzNsItxbpLDI93oO8a3T8GF6y+IXlpOi7x5WOEJoNwtsTGMG:6eO8hJ+wqTGMG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4012 msedge.exe 4012 msedge.exe 3112 msedge.exe 3112 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe 3120 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3112 wrote to memory of 2092 3112 msedge.exe 87 PID 3112 wrote to memory of 2092 3112 msedge.exe 87 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 3432 3112 msedge.exe 88 PID 3112 wrote to memory of 4012 3112 msedge.exe 89 PID 3112 wrote to memory of 4012 3112 msedge.exe 89 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90 PID 3112 wrote to memory of 756 3112 msedge.exe 90
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\9feaf21a6edf654d213a59df4a1919e9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc538f46f8,0x7ffc538f4708,0x7ffc538f47182⤵PID:2092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,3117217637213545146,12985831599570856143,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,3117217637213545146,12985831599570856143,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,3117217637213545146,12985831599570856143,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3117217637213545146,12985831599570856143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3117217637213545146,12985831599570856143,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,3117217637213545146,12985831599570856143,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3120
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2576
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
473B
MD5deb02184e40846e85615cb46caced713
SHA151acd7015b5c09a163de6275d87295ed515bb742
SHA2564ea0af4503d324b15a1ee11e2bd5ed7e6b8d2b4d6c5a5b08c795791cc42c7023
SHA512df3d361c339a3b35e20053d7580340cc24b6f17c574f872b6eb418fdf199961f26313ae02d7726c4318dc0e2cdd19add318f18001d98abea90cc7bbb4e4d5c5e
-
Filesize
6KB
MD58af79f777eab890320e8e6ce97293015
SHA1fccb7985d83e69af7a66e207b6f4fc496669ab69
SHA25619bcb92cf75c2689b7093f65fa9f47a90f0f9a16739e02bd5e47c1494ef9d32e
SHA5124e05a4a87ce86ef0312cb6fe14f7998c424fcc2832a39c64ba6c509bc79d512cfa1fc0d6699eeb0cd3d52c2b370b4b22ef9c63d2d93bd8ab22454c9e3593e066
-
Filesize
6KB
MD57271b9fdbe8ec1f7b4b668aab4e93bbf
SHA1e6dda05d72d86194df16d4afc044e647b2d5e483
SHA256961370acbd0dcd156494299017f9e12dee3e1ed1760d5379108ef5c2d749e5a7
SHA5128d8a39bb36c1b736fb383e1da832b8f5045cd731986937465085c1596a5685dd9a5a4bbdcfb59e1d0ce379e5faaafc0fee45b1acf5dd02783dc0d627d30678e4
-
Filesize
10KB
MD5f2e07d0a1be20ee9a1ef3d7c127e8344
SHA154ff3aec359b122598d4ef2382d36db8975e8648
SHA2567f74df690ec0462561feb94ad05ee0239e966061bb45e33b73a55b4df63949d0
SHA5120d0b9b372e880caa29cb918208eb01aed6945bc0b94f3ebf288c05e4dc619b5456a5de4260f9e74ed8d0a27998bd4da6ca80dbc449244900f5fc9bc3d63e3a61