Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
c8c1cc85720ad2ca1073223573d803ce_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c8c1cc85720ad2ca1073223573d803ce_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8c1cc85720ad2ca1073223573d803ce_JaffaCakes118.html
-
Size
132KB
-
MD5
c8c1cc85720ad2ca1073223573d803ce
-
SHA1
a8841a8cc40f6856c38440666f50892ddcae228d
-
SHA256
75c6db579b194a0be1b934cdcc12db74a835ebf25904518ab32588e5696261e2
-
SHA512
72dcd9b5885254fc2642ab6ff2959100b68639af6ddeaa21615e01a3193399e3775423d19a28b13fbdc696114665ebb3c0f79d38e2defce91aacdd5e3dfda386
-
SSDEEP
3072:GnnpBWRV8cxSXLmjwlYXU/Bh982PBxUhAwWvrOqI/fdiMhTc6XJHhAeiZu4il4wn:snpBWRiXYXU/Bh982PBxUhAwWvrOqIdB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1432 msedge.exe 1432 msedge.exe 2676 msedge.exe 2676 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe 4904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe 2676 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2676 wrote to memory of 3008 2676 msedge.exe 86 PID 2676 wrote to memory of 3008 2676 msedge.exe 86 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 792 2676 msedge.exe 87 PID 2676 wrote to memory of 1432 2676 msedge.exe 88 PID 2676 wrote to memory of 1432 2676 msedge.exe 88 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89 PID 2676 wrote to memory of 1444 2676 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c8c1cc85720ad2ca1073223573d803ce_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd001746f8,0x7ffd00174708,0x7ffd001747182⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,5546995363994216906,12475168211895971430,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1872,5546995363994216906,12475168211895971430,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2284 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1872,5546995363994216906,12475168211895971430,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,5546995363994216906,12475168211895971430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,5546995363994216906,12475168211895971430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1872,5546995363994216906,12475168211895971430,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1872,5546995363994216906,12475168211895971430,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4892
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize96B
MD5989c1038db487845752b831e3e811e5a
SHA11891b1d98718e62002b993fe721bb022dea8cd6c
SHA2562900aaebba25ef23a2e317324db05955a44336caae11f6d996c164a320d0539d
SHA512882ddd447b1394d131812d954a0bc413c8cb2d40d4c47bf6654f02f375792c2ca8461f974643a4862586b9b08ca76503403b62d88a7a197c2fd6c9d98fec7437
-
Filesize
1KB
MD5cfde92b5587b7e38447f15603939db64
SHA1b87bc0b31071064dabb1ef06250ea9e67683ebae
SHA256395c8b5f32dd83108dc9403269851640a546450fb3012857609a8e5a31f505ef
SHA5120753c825d5855b9431096f309ae24973ec019f7d5e2df3c71b4d0da7f46a71d2ec078cdcb4fb2bc9ef5665443a5ae6dc9ed3fa2f12d6fde4e95c3bade25e57a2
-
Filesize
6KB
MD56cde1537b41cc0a6a9ed6cd0d590c87c
SHA151b31a61444e08d1a140a8176f3a917434f7faad
SHA2569049da77cebbd8f26dd52a5676d7ae06137886df4c2f5e857ed95cc0e456bc06
SHA512b287d75f137323e5620c35961125f1dcd1f7c520c87b60512b7fa67dbe60324f41a5c0a4db1f5698c5ad62ca5b94815bfc0689e1461f9837bfad4b324ffb26f2
-
Filesize
7KB
MD5632c6904d5cdec1522d02512cbe884ba
SHA187f0c260f8eff3fe1ba1091c16924587ee9e2009
SHA256134706138a2f2ede9e764832f8d8d952c107770be986a95dc0e4350c37f80d74
SHA512ac4a8e62e1be8f2705533473e04859715d81f66923afb0f48fe466c19bef69010f00f30bafa717758660803ded26da5cac7c72ed41702282462282f4f62e84b8
-
Filesize
10KB
MD5a4e6f13410a35b5ca80033ff45238de3
SHA124b95dad9c86f56cfa9a26c494a102a7f0bbd0ca
SHA256ab22a3130055f3348cae749641eb9cb217f01e29f1c79ef1e7f339e2cdab755e
SHA512be07780f474c905959d8ea1f4dfb0476e5274060e9087c2c929c5e005a6da8c44cecc3a9c9967ee17bf3893ad11875711a1851eb6e6a7790fcaac757205ff544