Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 01:20
Static task
static1
Behavioral task
behavioral1
Sample
c7fcd22a5e2929ac2d8588e7c82129a0_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c7fcd22a5e2929ac2d8588e7c82129a0_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c7fcd22a5e2929ac2d8588e7c82129a0_JaffaCakes118.html
-
Size
121KB
-
MD5
c7fcd22a5e2929ac2d8588e7c82129a0
-
SHA1
849ab615b0fc4be14d4dff61433342cd74819f97
-
SHA256
44d86d25ec120e6e9640afc6c7f3a6d8659e199aa426cfe6771ca75b09a05d53
-
SHA512
35b5c3548bb28dbc5ca49b25c456cdff2fcbaf49247628234260b3369520e8a919bc19f763055487641733d135ffb76ca2b8fe2d826e9a7f81a06f0553051d79
-
SSDEEP
768:Ux3y3b/8rv6cbcEXHvYbxFw0e8sCulTe7LSvUtWk7axCD9cce6LMofJSRnAOLEek:UYriQLR3WYCTYSRnHLxrB48u80XeS6G
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4204 msedge.exe 4204 msedge.exe 884 msedge.exe 884 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe 884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 884 wrote to memory of 3232 884 msedge.exe 84 PID 884 wrote to memory of 3232 884 msedge.exe 84 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 2064 884 msedge.exe 85 PID 884 wrote to memory of 4204 884 msedge.exe 86 PID 884 wrote to memory of 4204 884 msedge.exe 86 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87 PID 884 wrote to memory of 1064 884 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c7fcd22a5e2929ac2d8588e7c82129a0_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc66c46f8,0x7ffcc66c4708,0x7ffcc66c47182⤵PID:3232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9679619894106090733,11612269601785703853,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,9679619894106090733,11612269601785703853,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,9679619894106090733,11612269601785703853,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9679619894106090733,11612269601785703853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9679619894106090733,11612269601785703853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9679619894106090733,11612269601785703853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5168 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9679619894106090733,11612269601785703853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,9679619894106090733,11612269601785703853,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,9679619894106090733,11612269601785703853,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4324
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1008
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5e8879fa2322959a2c66e08fc69537b70
SHA1b9cf5b086de3bcb83cc19442ca4a33a4bd28133d
SHA256fe303bcf8d198ebe7d4a6f1f467b43e38670f188b03f2fd9f784af90b284d93d
SHA51232019eca0c16a1e2ccdca93ed219bed0d13b7b04bdaa530c78d1da3de4c39fe4396f7e33b87f88291d2ad60e2a8fa23e43dc1f13ebe0e48a3a9a4c87406ac0ae
-
Filesize
6KB
MD5e2e7ad5f90ddfdd5072e4b67e1d29c06
SHA11c61d6b5e1f17c42a11f6a48c6afb6dad39c6611
SHA256cdab95c042cbf5a14b8c43e903c4b7ec1f0c912f6596ba0b8e68639ef7dd3ba6
SHA5120024783bbd2b58ab92435b1aa121ac9f2a830113747b34df64c690043b4285069aabb0ce5b9f51f2a62d7e8bcf21b8cca271e0df64eb7d0dadca0a780002f680
-
Filesize
6KB
MD535bbbb8a6fe3ed7cd4744911c88a5bf9
SHA1d1dbcd7f0578ddbdcd8db1aff03c0b166262ba93
SHA256a90aedb2b63413214f70065fd95769f7dcbc21884282b011961a81bddebc7435
SHA512d926c0160f1e39b8687c8588d5d314f3027b80ef186a5fe183b329e176ba4296d063da7882e81d0a74d0951842d8a05ab38318c4718eeae3e028b47b7d94cb82
-
Filesize
10KB
MD5b20ae628bf3d1dd4850510782df08224
SHA12ed9dc415d90fc26be97213c669d12970e238a4e
SHA2568fc2eb67728d7cd25c781912789986ca8ac62e3a86df31ee89faf7673930483b
SHA512f58b5e36ad50481395b3c80ecfe5f0276a1d8438feb337ebf202cc1e57b7fb4a73a7bcaa7de20965a33bb868e9c2b0ac80c7ed78fb340083042d6cb7df8be7f2