Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29/08/2024, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
c969eb3967ca8199708462bdfd49d103_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c969eb3967ca8199708462bdfd49d103_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
c969eb3967ca8199708462bdfd49d103_JaffaCakes118.html
-
Size
926B
-
MD5
c969eb3967ca8199708462bdfd49d103
-
SHA1
1b2052dc8935d605d05a6cba11bc7cc1588a80ba
-
SHA256
8c8ebcfd14647f4d337331f7691d29f74323f3a2e665d1cf0067fb066b8c1e06
-
SHA512
aa67a39e32328fc2704fc4ace48d61b175d83e6b61867857a077ede1753af6adbd3a4d24df41e9da09d57d768cdb4e0b6134af23d750a18070fc3c8cc5380700
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1556 msedge.exe 1556 msedge.exe 4704 msedge.exe 4704 msedge.exe 2472 identity_helper.exe 2472 identity_helper.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe 1640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe 4704 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 1300 4704 msedge.exe 84 PID 4704 wrote to memory of 1300 4704 msedge.exe 84 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 800 4704 msedge.exe 85 PID 4704 wrote to memory of 1556 4704 msedge.exe 86 PID 4704 wrote to memory of 1556 4704 msedge.exe 86 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87 PID 4704 wrote to memory of 2016 4704 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\c969eb3967ca8199708462bdfd49d103_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc9c6946f8,0x7ffc9c694708,0x7ffc9c6947182⤵PID:1300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1207138366875555750,2951747997836719684,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,1207138366875555750,2951747997836719684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2396 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,1207138366875555750,2951747997836719684,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1207138366875555750,2951747997836719684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1207138366875555750,2951747997836719684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1207138366875555750,2951747997836719684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4184 /prefetch:12⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1207138366875555750,2951747997836719684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,1207138366875555750,2951747997836719684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4976 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1207138366875555750,2951747997836719684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:12⤵PID:860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1207138366875555750,2951747997836719684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,1207138366875555750,2951747997836719684,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4820 /prefetch:12⤵PID:3236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,1207138366875555750,2951747997836719684,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5472 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
6KB
MD5e372cddfbdf6e9e7b578115151a47db5
SHA1eae94adcf64507fa8415026c9d422bfb64646be6
SHA25657df2193f2f9afe32157efacea50d4ca5ecaabd74d01e5e5a10b0b0b3d5beae2
SHA5120c74f03f37fdbd80f8daf643bf2a971faf8290181f303830b0dd80ae21cb7b92e957aab1795df574a1e92bd2a22e34474d22aece56004e9966d15c74ee3dc1dd
-
Filesize
5KB
MD51456fd5cd56c0dbb341a66a00c9bdd4a
SHA1f3d45d48040b804beb71679d6407be155b43c3b4
SHA256b749c3199ffeb82a2fd60baacb93041a4921da7a82733eb7cf8596aee4734e0a
SHA512e593db5fad7053517418d4f2d05091f73ffc15b6cb50c3c748da1d00de61f15b0a76c8405ad15b5e59902e4b0bda48c9d15d2f7c5712a961f2c68c0c729c4c1a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD56ce90b8b994991bd411db7c321a79e44
SHA1e4bf995feca3968c6fbe660a4083ed295cf99407
SHA256d56a9b4e4fefcf3daebc8302eff3fcab4301d65c21269137344864fd389c1160
SHA5129777655ab20d2a17ebd3d34edbe830531992b3cb9cf7484f6f79eede10bdf2be2761af11b2539173b71d9d774b63c22413516bfa8dddfac73cba299a7abc8a52