Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 15:06
Static task
static1
Behavioral task
behavioral1
Sample
c910189db0441894062cf2e5987b5982_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c910189db0441894062cf2e5987b5982_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c910189db0441894062cf2e5987b5982_JaffaCakes118.html
-
Size
49KB
-
MD5
c910189db0441894062cf2e5987b5982
-
SHA1
32b32d26ffc3d99301eb16ed3ead51e85a0f7c60
-
SHA256
1c04d85545717629a5ceb83a295ba6c972375bc80fbb148e5690c4c8fd020fef
-
SHA512
e35a52191680c469af447ade4a200ee2e9b904138e44ebfa9c16a2914f651dfc7926a5c2d61a6485aecd3cf7ffb889bd69415b0246592d5aef3574cb951c0742
-
SSDEEP
1536:dhKqUK9iXwaQiNT3jgQhBbxFOGrDZaMkvww26rGr8:dhKmAVHBlFRD02EB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1932 msedge.exe 1932 msedge.exe 4980 msedge.exe 4980 msedge.exe 660 identity_helper.exe 660 identity_helper.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe 1172 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe 4980 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4980 wrote to memory of 4140 4980 msedge.exe 84 PID 4980 wrote to memory of 4140 4980 msedge.exe 84 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 4776 4980 msedge.exe 85 PID 4980 wrote to memory of 1932 4980 msedge.exe 86 PID 4980 wrote to memory of 1932 4980 msedge.exe 86 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87 PID 4980 wrote to memory of 4032 4980 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c910189db0441894062cf2e5987b5982_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbf8ae46f8,0x7ffbf8ae4708,0x7ffbf8ae47182⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17121493548112735730,5247810417765163505,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,17121493548112735730,5247810417765163505,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,17121493548112735730,5247810417765163505,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17121493548112735730,5247810417765163505,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17121493548112735730,5247810417765163505,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17121493548112735730,5247810417765163505,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵PID:1724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17121493548112735730,5247810417765163505,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6084 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17121493548112735730,5247810417765163505,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:12⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17121493548112735730,5247810417765163505,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5148 /prefetch:12⤵PID:968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17121493548112735730,5247810417765163505,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5484 /prefetch:12⤵PID:3328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17121493548112735730,5247810417765163505,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17121493548112735730,5247810417765163505,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1172
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
588B
MD5be970be95d05fe632ac861c66c972a46
SHA1bada463ccc552400b170759d8214390d2328bc3a
SHA256d1b65827c03a0b047c84722729ec99d08eca990fbb7b4fa94684759d1ff9eabc
SHA5128b5c04684a2d4c3f5e5c6c65a8eebf71cbfa2b18567a053a193e29e026b9860001add5840f183be85efa740d901d58745b6cc56e8bd1b183a3dbdba2d7c1ad2c
-
Filesize
6KB
MD5fd1343ca87dc4f47c6842806f219fbd0
SHA1262abf8cba5583eb586a00e7f287d879160bc653
SHA256eb9231baa8b4c674fcd0c6965ca9ad70f697a7412e03f42c5973d8dc748cebf8
SHA512d952abd393ea7273f70b66155f29dbf5c1fbbfdd2a9f7a009fc5233715266c15b7d430a75ea55988b68622b18e3085f4440cb31c73f7e36e291a1b141f589a0b
-
Filesize
5KB
MD561263d851da75ad774922c772636ea45
SHA1fca8fbcd51dd54ffa0511ff08d4b7a31c2997913
SHA256a06e0975d85c7bee80a3fb867225dee874ed0996e92d87286dac12b4ed4773ac
SHA51228ddcc6166dcc371abccf13f69bbe93f2c0c38d2e3cc06545a4e6b34b0478f0ef512bd2ede76c6fe11e86f2fd6f86dea550a15c5565ee87e6ecf25715f5948ff
-
Filesize
6KB
MD53c75a4cc3a68bab03ae6ae5c3b0c8f80
SHA1f5e6f7fad5b1e45510b5cd42db3fabdbdefb67b6
SHA256b1b6891a5ec0793fbdfc1299ed37f592eb0f804340e080fb18bf09a6f5d8a0e8
SHA5125eb28d263488872ab0764b59175a3cc5ce83cc511381eeeab45ab58a40f2acf7811f83751555c2943bf506abefddb5bd783817dbe76ea94e0d1f28a475e7c036
-
Filesize
706B
MD5704d76ca88e2e8c48aaae1e2c40947c2
SHA1522f146b35c94dfd3944e8eae8487d0b02e8dcd4
SHA25672cfa717359328fa6590d901bb3f267f44c32edfbd6b768bd7af15b4ed65dc56
SHA5127b763fa6e97b3d36b4538e9ccae32df2e5ad783f1f88b486fff8f0f0e9869dee7d5c66d199b37f210cedaffc859498b2e1b95bbd8d404f9e5af9d42f35b1c30f
-
Filesize
706B
MD5115f48d555d747dc813efea7d2049afd
SHA1b30a07ff6f97817791368c2cc9892c23eed634b8
SHA25607e29bd960b62848fa42f30bccdbb86c5fe440ca6d0b7c06fba6b47b3a85f217
SHA51232c18cd55a4f5be13cb99177bee04c2d8f9547b806ec2d1f49e730d56303f226ae4284acda448145ce16f15348cb8b5de042026b723f001aec111d527bd0ea05
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d073396a5aefea38f178c03df089ae04
SHA1508eb4f112947bf374835b46b1aabf1b3a3d0995
SHA256223ba0b0102f1d18bc14828f53f4a738084d56c731ce9202e191894907ca14b0
SHA5129d1ae0893d5d5b5bfd21bed9a80b8b52c72a80d08f38e94d66dc6fe7b29ad494d7e4f6ed47f4d65ad795416ca49390045c5c62de21f315af0fbd0dec38347520