Analysis
-
max time kernel
31s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 15:55
Static task
static1
Behavioral task
behavioral1
Sample
c9233331dc5ce7412ad63e60a966ae44_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c9233331dc5ce7412ad63e60a966ae44_JaffaCakes118.html
Resource
win10v2004-20240802-en
Errors
General
-
Target
c9233331dc5ce7412ad63e60a966ae44_JaffaCakes118.html
-
Size
139KB
-
MD5
c9233331dc5ce7412ad63e60a966ae44
-
SHA1
43f8c5f0d58e148712e601c1c4bcbc2c2a1be14d
-
SHA256
d13c2b82cccb6b61218cf8493e4970d248dbff352c285d6b497464c42d631050
-
SHA512
3a6ab190a273fa3e268fd15fc35da8dca52d65aa1feb2c1b407f1b8b622f286908724a98a8bf8617839444f18a063f22be54302413f5c8b05b44acbc34304b78
-
SSDEEP
1536:SKkv8FcAl9lsdISuzm64yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SKkByfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe 4308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4308 wrote to memory of 1036 4308 msedge.exe 84 PID 4308 wrote to memory of 1036 4308 msedge.exe 84 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3064 4308 msedge.exe 85 PID 4308 wrote to memory of 3496 4308 msedge.exe 86 PID 4308 wrote to memory of 3496 4308 msedge.exe 86 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87 PID 4308 wrote to memory of 4556 4308 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c9233331dc5ce7412ad63e60a966ae44_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffacade46f8,0x7ffacade4708,0x7ffacade47182⤵PID:1036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,5322276188254118238,14400052354182311979,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,5322276188254118238,14400052354182311979,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,5322276188254118238,14400052354182311979,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5322276188254118238,14400052354182311979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2628 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,5322276188254118238,14400052354182311979,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3160 /prefetch:12⤵PID:4148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
6KB
MD51dbb127d95f8e83b0fd5d7e7ad665abf
SHA1eb8e09255ba019aa168aed44366a6f8da1c1c0f5
SHA256b333ffeab239ecd4727c99d85b6d58d904384cfa0cb9e40393085fc1428fb286
SHA51239caa75d5fba281328b9cfa2df41d0689e89e8bb3bb728372bb09e91b84f1f9efddfa0fe4dae2969869fae194419302bb9b1781d5cf1ccdeb37e545f0d90aba2
-
Filesize
5KB
MD5efa2ef90bdacb5454180c5cde40ac803
SHA1c3c288cc2759ae2befbd1f993f95a8a8f15c5b41
SHA25621f36334d2258c6da135510d1aa1e781fefea8813ec735f7bcaa4ed60ead29f0
SHA512e54c5af71986d44fe3ba64c70116e992f976bdaf8b9911317ebf0df9c327827d156aa5f548156e41d02cf78faf7cb12b67da05bb9015534795e5dee4e1aa396c
-
Filesize
10KB
MD5a1a2cea5764cebeac5c618b66b239512
SHA121049cc4d3b405b6c6369e2b05995e2f91798562
SHA2561805f5913d186426cc9ccc613c671cb18803621712e494057823934c540c5683
SHA5124addd055eb9b6993b3747e889eabbc276840eb51d30df424ddf8849f717bc461bfd080ff543bfd37a5ba221fb2e89fab2b2e9241f0e51a4372d25c9a55a5109b