Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 16:56
Static task
static1
Behavioral task
behavioral1
Sample
c93c7c2ecd90bbf97d8af473a0f6f670_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c93c7c2ecd90bbf97d8af473a0f6f670_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c93c7c2ecd90bbf97d8af473a0f6f670_JaffaCakes118.html
-
Size
18KB
-
MD5
c93c7c2ecd90bbf97d8af473a0f6f670
-
SHA1
7618cc54d65dce67399c80c8f0f185d20587aa78
-
SHA256
ddbca818edd3267f88cc9f2605cc2df85f1a8d8845f0337735862895c6a63409
-
SHA512
5a2b9ababbdbb1514b93d66e6ddb615e160988f2aec6775853556f2fdb451b477c795bb51160fa06a61a99527540baea8e1f8d68c26800e62208e5d7aeaf0ac3
-
SSDEEP
192:SIM3t0I5fo9cOQivXQWxZxdkVSoAIM4gzUnjBhc282qDB8:SIMd0I5nO9HVsvc1xDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1064 msedge.exe 1064 msedge.exe 4392 msedge.exe 4392 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe 4392 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4392 wrote to memory of 1960 4392 msedge.exe 84 PID 4392 wrote to memory of 1960 4392 msedge.exe 84 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 2044 4392 msedge.exe 85 PID 4392 wrote to memory of 1064 4392 msedge.exe 86 PID 4392 wrote to memory of 1064 4392 msedge.exe 86 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87 PID 4392 wrote to memory of 2476 4392 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c93c7c2ecd90bbf97d8af473a0f6f670_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9d48d46f8,0x7ff9d48d4708,0x7ff9d48d47182⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1776,3615861504232581693,18254455870334191958,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1776,3615861504232581693,18254455870334191958,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1776,3615861504232581693,18254455870334191958,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2588 /prefetch:82⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,3615861504232581693,18254455870334191958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1776,3615861504232581693,18254455870334191958,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1776,3615861504232581693,18254455870334191958,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
5KB
MD5dd1c5ccbd53a41923c4205b66e811e99
SHA17df23c34ed51c15cb6346202cc9b9f6ac7921426
SHA256a2b0947e4abf611bc6dec6f5120bbad9265177506c219d459c7dd8638880c2b2
SHA5127695f8ce5a76b437a04e8acf6f17843e92391f5e5de224f3b9c69a6a1da19c3c3211c817ce9e47fe391a6df8492d0fcd9161d15e3552dcf09a0430d5bba55c75
-
Filesize
6KB
MD596dc3c1075092ee60e8033a4b2caef59
SHA17c2ac4bb4baa61e4b2ea2e22a6b31e98bc4778ad
SHA256cc3c61d9029cf409eb2b65a96eea8d514864f1493f66827bce4918e168956a51
SHA5127ba7a29925eda114fd65e64a5acc5daddf2034ca2d233200ddf95ddab562bf0bf405b498883a26870b340323a65db279a84d06cff06f116b272d31a16f1cad56
-
Filesize
6KB
MD5beb7d2e313f0f1a4e9f3272f1bc5b5fc
SHA1a1634ffe867284e3cd53602040405e7482950784
SHA256e6febd874d7ac9620fc09dba8e425ae6bd66d586e2f93c8d9d6ec24f83e62bad
SHA51256cbefe170cf88fa109430ec0785f133739dfada28a24361db4e7e965b071b449489b8b1b62da2a9002df03cec8177ac5f150cd8239524f6abf9f6f5980897ac
-
Filesize
10KB
MD5012ea41648195184be7801ceadf085fb
SHA115ebce0683100515d4af325325aba725bded6c7d
SHA256563f91b9348812b7f702977fc4f7f3e15e52bce7fbb75cea34469e3fe48c0047
SHA5125fbb600bdc6c5bd909b9af2e34b1eda5996531250ccd5fb7f65934bef70b98ef92b6e06572083507235f6cfc177468cbb32f1ccc806e7e8e642926988f5436a1