Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
c82f1b43c76f88525c0be46f78ccf5b6_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c82f1b43c76f88525c0be46f78ccf5b6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c82f1b43c76f88525c0be46f78ccf5b6_JaffaCakes118.html
-
Size
160KB
-
MD5
c82f1b43c76f88525c0be46f78ccf5b6
-
SHA1
8790d630aaa3e41a0f9016a75767f2940f2653e0
-
SHA256
5098924698f7b8ccd6d1e1045128444dd404f7ecee6a84a06cc8b40214242e5c
-
SHA512
9bb83e3de405960f65bd4ffd9dca6bf2438c36f3c1d21c231849925a605d0c8972740ebf86bdf89a9e93537bf13062826f9c642a2395d7d6e0537a7843c0921d
-
SSDEEP
3072:BM1sDuHI0YW+MbAYoOJPaNYTK8M1sDuHI0YW+McM1sDuHI0YW+MZM1sDuHI0YW+T:2+3eAaKN
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1740 msedge.exe 1740 msedge.exe 4356 msedge.exe 4356 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe 3832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4356 wrote to memory of 2432 4356 msedge.exe 84 PID 4356 wrote to memory of 2432 4356 msedge.exe 84 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 3028 4356 msedge.exe 85 PID 4356 wrote to memory of 1740 4356 msedge.exe 86 PID 4356 wrote to memory of 1740 4356 msedge.exe 86 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87 PID 4356 wrote to memory of 4444 4356 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c82f1b43c76f88525c0be46f78ccf5b6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb6b846f8,0x7ffbb6b84708,0x7ffbb6b847182⤵PID:2432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10631441513811393230,11650186219047899066,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,10631441513811393230,11650186219047899066,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,10631441513811393230,11650186219047899066,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10631441513811393230,11650186219047899066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,10631441513811393230,11650186219047899066,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,10631441513811393230,11650186219047899066,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2920
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
383B
MD589982d7034e0a01adccf3242f549a168
SHA179a43e5808ad4b7313cdbd17fcfc13f78c6a215d
SHA25603bf2b85664923a180257f78f38e617b0288e4bd008effdf7c45d19e05861e85
SHA5123f64882718544be46c3ca2741a5bb9e1075af0ccdcb88227ac1ee84d0e5e950e3dfc32cddd190da2b367c89ca59af220ab983793b96c7b0fca32493f2cd21f6b
-
Filesize
5KB
MD52b9b8ad2d92a5c3003d8046edaf4720f
SHA11fa113ba8e90b1df91964b7b66ec09cb4bc2edf2
SHA256e0bdd4664fa103b6b0e475cfd2e5d6061cb42dc45c7823bd0af4aa7a2b97bc7e
SHA512ee1f4c399dedfa0b6b6483edb7db4add0c3f09ff64c2e74077ab7840662a8476fddce983f254ef2d3edb11e85b89c7293bd76a9c056d1fb6b80bc190b3f6fdfa
-
Filesize
6KB
MD530a6b2bc7750bf6ea2917607a494bc42
SHA19e57f1027179dd8290fb736572dec2e4b2c2cc00
SHA2562de397b6968751cc53c34d14f720bb23949439229bb5c87f907a3d94b2c917a0
SHA512b010336cf2cfbf9378a9047d1ca6ab9c4a88d4bf18c9e03d6850d3313ace994eb6ed4b6e94747292b036ea5b9dd4ac23106bcd53ae6c36d64192b3ccfe0c9a64
-
Filesize
10KB
MD5cccaa22c5ba38ec43bb9f399eb67b4b4
SHA114db840b9b75c54adc7ec96dcac514a0f390abde
SHA25611d112616333c075e865e08f890d3c269981fd6231974eb398fd9998c77b005b
SHA512398bd37aa6c86d15e589ce7d6dc2bfdf1d6c1c3abef37ce69fe42b1338d15f2e0b9a73862b9981d0b4e3cb54b13edfd2c7def64b77edd0e87cc3f1dc636cd946