Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
c97cd98136644269bdea403e63c95c0e_JaffaCakes118.html
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c97cd98136644269bdea403e63c95c0e_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c97cd98136644269bdea403e63c95c0e_JaffaCakes118.html
-
Size
56KB
-
MD5
c97cd98136644269bdea403e63c95c0e
-
SHA1
c278bdd364ef6d611cc58eea243d844505ad025d
-
SHA256
7088bebebd1f85c4fba79e95fe9cb575a6a78e66126f07c9cce99db4b0012f1f
-
SHA512
e247a2f05257722cf6e50488d28094199bf397cbc941d341e21604e9c8a7a68b30b009b7bdd609fe19505bd40cf68647461077788a4a5efcb3439083351ee3d0
-
SSDEEP
1536:GsTDbwmZ3vdBZollNa+GiGxQsjYsRzvMPJmO9gsfF+DP1o8:Gs5VvdBZollQDiGCs9P1o8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1928 msedge.exe 1928 msedge.exe 3820 msedge.exe 3820 msedge.exe 3592 identity_helper.exe 3592 identity_helper.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe 1308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe 3820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3820 wrote to memory of 1120 3820 msedge.exe 84 PID 3820 wrote to memory of 1120 3820 msedge.exe 84 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 2908 3820 msedge.exe 87 PID 3820 wrote to memory of 1928 3820 msedge.exe 88 PID 3820 wrote to memory of 1928 3820 msedge.exe 88 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89 PID 3820 wrote to memory of 4256 3820 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c97cd98136644269bdea403e63c95c0e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c8c046f8,0x7ff9c8c04708,0x7ff9c8c047182⤵PID:1120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11261365170041047212,10240532030529150968,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,11261365170041047212,10240532030529150968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,11261365170041047212,10240532030529150968,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:4256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11261365170041047212,10240532030529150968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11261365170041047212,10240532030529150968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11261365170041047212,10240532030529150968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵PID:4924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,11261365170041047212,10240532030529150968,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6048 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11261365170041047212,10240532030529150968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11261365170041047212,10240532030529150968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11261365170041047212,10240532030529150968,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6020 /prefetch:12⤵PID:3336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,11261365170041047212,10240532030529150968,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5924 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,11261365170041047212,10240532030529150968,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3564
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
6KB
MD54988f689519a1de7d8a9652b110d718d
SHA101e3c70e992c5cc19e8488b6bca8fc63a3ae1987
SHA25620a40bfa554d2ec416fa197a9b75fc1a338db9c42d359cffd3368b567a93e0c3
SHA5123bdc4616f740eff14d14782343c104f3eabb3af105230caf9df949b84e9ce0035ca0870cbd3d036de54beb2e954773c2515d022b7914f22a09c0dc7c54cb34fa
-
Filesize
5KB
MD51bbd2dde70e5105bc5f08ff2b6d67c90
SHA1ffb4c50a6ddbf124721cdf247819bda142e2fb26
SHA256247517ae53b20df0e197dc0808c4355c0f611ae32f5794e6cdfc5e75cc92033b
SHA51243523974e2531f20ede8c07b61263ed14b5a474f74fb50fe2eb94feebf80c1499b77b060c6ce4dff84eb11c5a9a297330356856423a91ea87616e4a686bad9bb
-
Filesize
6KB
MD5cd47351d9a69ec944570f026370fcb4c
SHA1afb2f223bbab36b154dbc86368a9d20bda92a0cd
SHA256238bf0ac82ecb9b048e07a0ac4fcc850d0b758503a53d193722759baf93cd0b8
SHA512e45d4c972f5dad08ee6fd396b295b9ba3dd9996cfffdd8c8d1f17b5677e132fab3da99f1339a79eb110e87ed1a0b0c9e8c754345bd02d784762e37dd4813caa0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD54a773236c534d26214485b015b6f0107
SHA106b04b777fe2fa8000b79efc47c08de8a0e06a66
SHA25622e3bc2cf2b6ecee9f2bce0e061835d3cbe4acbf74107bafb749022517f03fe2
SHA512d20ac337e06f8c4e6ab485ef91f7f5c25c5908e17f6de86b8c4d104780b562876a344bd7086008a83cd6e398d376b0d06614c9b39d632f7f8cc7af13b31cc6c1