Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
c7d5ce9b3372881184c8723666b1156b_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c7d5ce9b3372881184c8723666b1156b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7d5ce9b3372881184c8723666b1156b_JaffaCakes118.html
-
Size
58KB
-
MD5
c7d5ce9b3372881184c8723666b1156b
-
SHA1
c6ecfd8c42e2734404e184af25f774ac77639a7e
-
SHA256
3aa7e1d6c841ab7be2cbc84c3751c8ec38b3c4ee4b2cc4ca08caef7fd0375656
-
SHA512
5a5342f90924bb72ee0ce8c2622848390bc64e40fbe81f5ca5bb124e7a0151c421a4bf9ebf3e6fb3821c557904dfcc31a7a6f1719aed13604b8ed6db5653437a
-
SSDEEP
1536:IblJmjI193v/oFNOICjowtSiJq38CN+yshy:Ji9mW+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2836 msedge.exe 2836 msedge.exe 3196 msedge.exe 3196 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe 4700 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe 3196 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3196 wrote to memory of 2308 3196 msedge.exe 85 PID 3196 wrote to memory of 2308 3196 msedge.exe 85 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2256 3196 msedge.exe 86 PID 3196 wrote to memory of 2836 3196 msedge.exe 87 PID 3196 wrote to memory of 2836 3196 msedge.exe 87 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88 PID 3196 wrote to memory of 3900 3196 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c7d5ce9b3372881184c8723666b1156b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed9d146f8,0x7ffed9d14708,0x7ffed9d147182⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1476,8850387291788607604,15002099082446609042,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2036 /prefetch:22⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1476,8850387291788607604,15002099082446609042,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1476,8850387291788607604,15002099082446609042,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,8850387291788607604,15002099082446609042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1476,8850387291788607604,15002099082446609042,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1476,8850387291788607604,15002099082446609042,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5380 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1172
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
188B
MD51ba548e65e564c249c8857b11bcf04f8
SHA114ff2e245cddf43a3a3633f89797ce3a3f50a686
SHA2564928224849ec92776c40df5ccc45e909c0e4893204913e74b980526a5af7dd15
SHA5123a8fcb122fb2b131d8eebe5f1bcdbf849f6f65eb4e593cf1dee31298c536feeec9a94b82a343622ab5735fb64a8d181ab82653501098ae1eee19a45a3807d43a
-
Filesize
5KB
MD504f44d4a3171c7c7c650e92f1dba6346
SHA1acfdb4aed3cc69fa7a99f9b38ecff35a7a38325f
SHA256f067331198735753d7b9efe73f6b76cee1635e4dbbe4ff453c9f8ad95f174886
SHA5127781ee727fc392e843b07d89304e9bc1845a75aa0c3c36713574f84ac9a1d910bdbd0a649204f27c400f017fc49f39b8e3a0ede53e330529cb333929dbc4de79
-
Filesize
6KB
MD54e86f8db6d3f4d303861327b07095e9d
SHA1292065e649fa32eb065421f16d35d4ce4acdcf06
SHA256f3b38dd4c5ce20acd87a6c57c4ec50812960fc44a945c43c36f9ece6854d604a
SHA512df92232d516663789c3bdc9d99bb8696bb90ca292413b3b4e723446de214683e6403500fad29e43eabd06a4d882e4e1cc6fb6e76d165f3b0587e1f080a469ac9
-
Filesize
10KB
MD5f9a35cd3ad5744ae8ed0efa302aeab30
SHA1f17671cde18efb6ba597884727cb1e8ee6832c93
SHA256d388f7a0116a601906916e64fa6921607137bf7041c46d759205ca2ba21525ea
SHA5129e0e33cf8640817b1c8cb17fa433b4f1b439d1af732e1121377b448fa89827688d2f38fd353a4dc0b53a9729fba5aa98a6d89355dda35a0fbc9644384f33217e