Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
a570afb71dc8adca8c61112336245905_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a570afb71dc8adca8c61112336245905_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
a570afb71dc8adca8c61112336245905_JaffaCakes118.html
-
Size
213KB
-
MD5
a570afb71dc8adca8c61112336245905
-
SHA1
4d8740087d92d664225781803a5f1038f5d4e695
-
SHA256
727377889c9b5a4e6e3fbe4d50898d69de6d7a83de648e9b1361dc924b25d3ca
-
SHA512
dfba99f7afdbb8bce1ee74b7354074cb7f06f336212853af4cf22516031cfd7e43f728c6f926ca3aed4a11cd28b877db13ae9aa4aa8779dcce3ddf91f65e7eb5
-
SSDEEP
6144:LzB4armwQULt+c8poQItytV3pJ+Xg9eUQtWuMZGj5oT/QiJhKtbQ0MDS0Yz5FUnb:vB4armwQULtp8poQItytDJ+Xg9eUQtGv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 4052 msedge.exe 4052 msedge.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4864 4052 msedge.exe 83 PID 4052 wrote to memory of 4864 4052 msedge.exe 83 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2976 4052 msedge.exe 84 PID 4052 wrote to memory of 2276 4052 msedge.exe 85 PID 4052 wrote to memory of 2276 4052 msedge.exe 85 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86 PID 4052 wrote to memory of 4736 4052 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\a570afb71dc8adca8c61112336245905_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2ffd46f8,0x7ffd2ffd4708,0x7ffd2ffd47182⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,6987749685227670523,1990029325067345847,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,6987749685227670523,1990029325067345847,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2292 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,6987749685227670523,1990029325067345847,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,6987749685227670523,1990029325067345847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,6987749685227670523,1990029325067345847,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,6987749685227670523,1990029325067345847,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1896 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
1KB
MD5b348d69424bbb2c8324a35574f803cfa
SHA1917cf061ac487b86fcbf8daad6145c4ac57f73ee
SHA256deb689cb53895eb68821fd22ab7863f1515ffb938973fb82ed880e5d79f9af77
SHA512936923ec6523652bf605bcd1db0f09afd8fb930c0029cee5e90007cb60dc2df22842ce4c6aac3807f9b1845a71a0ddbd9170455777ed8810c1c35778aacea151
-
Filesize
5KB
MD52bc8c0666584b24e2fc5b99c79346bf4
SHA1f02fa0386c792a0121b93530081c598edf6417fb
SHA25632c1b46a2ece5a41a12dc3d395366953611f7f7f6377dfa897aa82e0e5517828
SHA512759c0321a8a9935401f9049ee392a0fd1b80114374ad13b2139142b3e74d0e1a94cfd22f30fdeffabdce12d2a0c17476aebc6c12f402704c991aba828c58a147
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b96688fc-1f42-4865-a1d3-e1b06bead183.tmp
Filesize6KB
MD5682540870339fb17a147b936b9999c01
SHA1137603271ba760f8f4b69b31d46e45d78c9c5282
SHA256f9e1da6b57030ad331d5ea2fd0d631f91d9ee927681aa87295f2a110cb584f18
SHA512fa0bce264e1fc8a90d44e0fc9663145096510798f7369acc02da769a37de85feb7d3bcd22db2029656b34d78f3674f50761b694bad96cbf6d168cd1bc5b3ac43
-
Filesize
10KB
MD56a8ee7beb3d7d92d9f004f9d81836c79
SHA15d0537a5cecbd78123ace4add662eb4a2b507524
SHA2569f6bd3068da79495ab0d1b45e212551405d280e489c8dc57c64d2d87e8fe9f78
SHA512199ff911fde663a7f29b0f06a7227005307dd202ea1291a89a3c77f8193bf29fe30f4ce291404b9d4a6ea960138e48a9a686affba395919654191304fe3ed703