Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 12:20
Static task
static1
Behavioral task
behavioral1
Sample
c8ce3615522e656340689e9883b19689_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c8ce3615522e656340689e9883b19689_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c8ce3615522e656340689e9883b19689_JaffaCakes118.html
-
Size
120KB
-
MD5
c8ce3615522e656340689e9883b19689
-
SHA1
0d8d58b0e34ddc9fedcfa31b86cf6ac40286ea15
-
SHA256
7deb4f8f445929c0c05f9f18fc72242e2f8c3f86d0f258d9181c17285dccbcae
-
SHA512
fc8e93b867c0eaf67d68e77285b94e720b39062c77f8aabf20dc1f567fc334e8f28eebfdd8a8f859021c36f8a1cb7865a697d84ab66e4a4aba3266c21e5e1a7a
-
SSDEEP
1536:hmX8i4njFvyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTs:hRJyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2008 msedge.exe 2008 msedge.exe 4548 msedge.exe 4548 msedge.exe 1844 identity_helper.exe 1844 identity_helper.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe 3980 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe 4548 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4548 wrote to memory of 3620 4548 msedge.exe 84 PID 4548 wrote to memory of 3620 4548 msedge.exe 84 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2620 4548 msedge.exe 87 PID 4548 wrote to memory of 2008 4548 msedge.exe 88 PID 4548 wrote to memory of 2008 4548 msedge.exe 88 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89 PID 4548 wrote to memory of 2216 4548 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c8ce3615522e656340689e9883b19689_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff807f246f8,0x7ff807f24708,0x7ff807f247182⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,3395401471250285343,2161593989744818492,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,3395401471250285343,2161593989744818492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,3395401471250285343,2161593989744818492,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3395401471250285343,2161593989744818492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3395401471250285343,2161593989744818492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,3395401471250285343,2161593989744818492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2072,3395401471250285343,2161593989744818492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3395401471250285343,2161593989744818492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3395401471250285343,2161593989744818492,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4976 /prefetch:12⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3395401471250285343,2161593989744818492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:3412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,3395401471250285343,2161593989744818492,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:4784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,3395401471250285343,2161593989744818492,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4852 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3980
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:372
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD5ef6a9adda0df1faf3858c529d9a11e70
SHA130fe7d089d6592fcfa5b0693e09a2fe991c903bb
SHA256fd5721cfd5185cf57c65feb3d1e9cdfc79412c196d18cfb1077824c0ebcef26f
SHA512f813c0704213d0d98d31debebd43558b4e574b0f0b57d2020a9dec3e3cb3e9265267f47bc0c3d2ea263def8e52120062634cce06f800490958456bc105a4fe2b
-
Filesize
6KB
MD546f152b44ea8407d35799a3d5d8d48b2
SHA1242e360e1ae6cd527f616a50bd5349feb6a56305
SHA256baf071bf545745650fb477a331e005cfc03aedcb619cdd88dd8b676d0beb641d
SHA5128a1e28842bbbd6987d8a445c3ad6f94926250ceb25bb42db90abb230801e2fdb5edf46baa2fe3a74c3d6fd5cd29fe14f290046f4c2008c0980dae9caf7659e50
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD58780d45870f9a67e1c408fbed2fb5ba3
SHA1343b57f60bd933a611c8cc23db790adbf2db2cc9
SHA25614aaf10d6b9a2e5ac4ab81142d34182eb981e11e0411a1e70769ba1d35e0793f
SHA512721b8ed42d6ffaac8371e2c43f521496deeab18bf2ed9954331c9cdfb0804f7245a7da4a9a5ae1cbd1938501c6ceba3c42c093612caf7f18b6be6841c48c4e1c