Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-08-2024 17:57
Static task
static1
Behavioral task
behavioral1
Sample
c9540d0beb680d0861340c26dd066eae_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c9540d0beb680d0861340c26dd066eae_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c9540d0beb680d0861340c26dd066eae_JaffaCakes118.html
-
Size
29KB
-
MD5
c9540d0beb680d0861340c26dd066eae
-
SHA1
497e7eed1ebcf450b0402cd84fb9f3c614081cdc
-
SHA256
c43c9bb827c45b68b787a3468e9378e3265e22ab77ee3622f43f72005930826e
-
SHA512
d1356bb305a7ff3fd0b6f7f78d2f2d975e2e30ee7c7beadb6431b7f811f1b327021c3ea2a2f63a59627198a71d215c0ea80857c75de5fce4677499c15125fc41
-
SSDEEP
384:mkERvLICNRql8oAMBCinUVp7Q/nxw+Atf6hJEZxZ1xZ7BLP9QjfkiscvWOT6Wrtg:gD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 2052 msedge.exe 2052 msedge.exe 3564 identity_helper.exe 3564 identity_helper.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe 2052 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2052 wrote to memory of 3348 2052 msedge.exe 83 PID 2052 wrote to memory of 3348 2052 msedge.exe 83 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1128 2052 msedge.exe 84 PID 2052 wrote to memory of 1864 2052 msedge.exe 85 PID 2052 wrote to memory of 1864 2052 msedge.exe 85 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86 PID 2052 wrote to memory of 3552 2052 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c9540d0beb680d0861340c26dd066eae_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd2ffd46f8,0x7ffd2ffd4708,0x7ffd2ffd47182⤵PID:3348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,12828677083115032299,10305166460073417616,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:1128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2200,12828677083115032299,10305166460073417616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2200,12828677083115032299,10305166460073417616,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12828677083115032299,10305166460073417616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12828677083115032299,10305166460073417616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,12828677083115032299,10305166460073417616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3080 /prefetch:82⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2200,12828677083115032299,10305166460073417616,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3080 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12828677083115032299,10305166460073417616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2092 /prefetch:12⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12828677083115032299,10305166460073417616,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:3104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12828677083115032299,10305166460073417616,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2200,12828677083115032299,10305166460073417616,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4984 /prefetch:12⤵PID:432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2200,12828677083115032299,10305166460073417616,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5568 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3044
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
6KB
MD53efd0d27bb38979b4b908529c2be24de
SHA1e739e8512a9f07c92a6732223e44d8de86bef042
SHA256329b82b09cbd0f2c677a8718dfee7a1310358a122559fe0d06d34ebb2f7f7ca4
SHA5124d49cd08d8bec9b2bee9b8cc15f1c0d7438aeda2ce9ce308f1a251cfa95d1900ecdf8588cc43d34665ef448cb9081ccf61e60b6aee67f05d37b470f8f797f509
-
Filesize
5KB
MD52edad4ee850e86e3cd8b5bf11e097edf
SHA156ba6d001aee9b115a0c7632ecf3bf36dd02c22d
SHA2561524cf374b4433eec5e2660f37c7e8b19b6df90b6e5c9336d3b129c7c5bc64c1
SHA512303195ce621ebbe4820ba2b25c3cee00b20c7310b5d7c1068cfe13957b0abb53a23674758f4be264403bc895b3eb321c33b80f38a255c8152c33449ff5bcb18d
-
Filesize
6KB
MD523e1f65df933234415fb5f9bef9015ea
SHA1bb921496c31ebce2336485e11df48461a7438678
SHA2563bb6644d81a9f8c07024ad8042de095cc89266c2018fe2ac7007ff4391e92c52
SHA51215f49d0308237a01d624f47367348cc499471441e3f63f8b7610ce2368d70eca6cbdfcfeb2a4392379e4f62b06c7e7fb990258b0b0c24ee8b449c07cde86bd68
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50b699254f72f89b8ac00552ca735c13e
SHA14c54837f4325e5e028c70d7af6baa6664dc7d65a
SHA2566ba735065bdc0f159d009aab63d278ed7a06c144cee41c4e6c71976476f86fca
SHA5123a2fe254053ca4f36861bf05b161b4cfdcf3910d9abd7c61319d7466ac20d806ef26db7d048fdf1c480f40152244f5562750c91018ca145ebd822dd8555e391b