Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
b089a5df50cc2f51964878ac7e7ceb33_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b089a5df50cc2f51964878ac7e7ceb33_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
b089a5df50cc2f51964878ac7e7ceb33_JaffaCakes118.html
-
Size
66KB
-
MD5
b089a5df50cc2f51964878ac7e7ceb33
-
SHA1
d538d901256319f485d877b77132299889a8359c
-
SHA256
e0862dcbf6d6ed16631f7f30237ec3101a69ba1fad22050cdeedbeebef91b8aa
-
SHA512
d154a4594924ec8677dec62d94c03625bc27d5cc5a81423ae0da8ce17a95c2642d9772f5f4ab9ebd98ccf806ed9034f6c00701c83ccb53291a5cad917b0c87dc
-
SSDEEP
1536:+lGw5IpBVBNm674582jmiZMNxt5mERS1El1Apal:mGpBxxA82aiZMNxfbiEl1/
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3396 msedge.exe 3396 msedge.exe 2084 msedge.exe 2084 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe 4420 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2084 msedge.exe 2084 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe 2084 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2084 wrote to memory of 3416 2084 msedge.exe 84 PID 2084 wrote to memory of 3416 2084 msedge.exe 84 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 540 2084 msedge.exe 85 PID 2084 wrote to memory of 3396 2084 msedge.exe 86 PID 2084 wrote to memory of 3396 2084 msedge.exe 86 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87 PID 2084 wrote to memory of 3532 2084 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\b089a5df50cc2f51964878ac7e7ceb33_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffa2f8c46f8,0x7ffa2f8c4708,0x7ffa2f8c47182⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14237656205545113405,18421882304864234113,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,14237656205545113405,18421882304864234113,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,14237656205545113405,18421882304864234113,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14237656205545113405,18421882304864234113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,14237656205545113405,18421882304864234113,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,14237656205545113405,18421882304864234113,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2224
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
790B
MD5bd764cb561d745af116355e015b4f9e6
SHA1ec114297637c551b23ed7366f1784d8e28ff7e61
SHA256a05fbc1ed6ced7b6e6c4e7d1dfc0e9840bc568574673a064a1ad09f341b4e700
SHA512ab749048f425a5b8e1a0033bdc672363965303fc93d678503063d39fdeea6aeaa8e97e464575aafb3f4841a01c2daf1c471bd6a52f86016ccd21a3b8058c6479
-
Filesize
5KB
MD50d984f6537275b51b619d6024af6727e
SHA148c655e4f62746531de68ba9a6d86755d64e5437
SHA256e915c144731b870c839b021804285bf29fc3b5c6d06446939181f24be32068da
SHA512580ef5c964c4c90ebbeeaaa79178cdc056b6c27cfed150bdf01f7326983813e9631818bc6ad3c76fb0fe0ead2973d1d89bc99792ef06c95fb1a353d7d2e8e4d7
-
Filesize
6KB
MD5f7bfbed7b9839d813449f1cc747ea0c7
SHA1ea8d29e660385438494f995b2d57f09f051d89be
SHA2561d060da9dc381c39e722b6e79cb2e064703806efa7e79c79dd96a2108bfbe15b
SHA512b0f6df2de5339986223f1e10e11422398345133c6e30319edd6ad0b647261155a82d7940fbb7dbff1101bf0190c2634a92fbfee39348ed6c6ec1b77fbdb063f0
-
Filesize
10KB
MD5ed954a720a6652920cf81697cd193e63
SHA1225127c6bfe8d93e4cd6630403b9bb1a8558c6d0
SHA25675d5770a6d7e1fc469e67dc1e2b2e8be33350665e5ee8a3517d723a933e46c7d
SHA5122acd2a492844f84d26d81f0b93d8b59cda8ca5addbd59dacb449ecd4ba7a6af3fa593baf4d809bc2e45d98e33b73c3055f641b4f71e98fbc03c24e7145ffaf44