Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
cf1041bfb704f691d368d40e42c6243d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf1041bfb704f691d368d40e42c6243d_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cf1041bfb704f691d368d40e42c6243d_JaffaCakes118.html
-
Size
221KB
-
MD5
cf1041bfb704f691d368d40e42c6243d
-
SHA1
66e1da2f9f5e88afee41eb576ae4f6dbeaf1e6ae
-
SHA256
06e98c4df05729e11358e30eb663951c373e7bfcfcab959001adc0467889f2d8
-
SHA512
3300fa206aff77b777691cced5205b881fd271dd70c3e78c32046ab7a3f1f56dd6be48d05deaed8b454269735ba015aa00c18e376b407995d835cc1ed64ef723
-
SSDEEP
3072:SC3UgM4soXRtEyfkMY+BES09JXAnyrZalI+YQ:SCS03sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4312 msedge.exe 4312 msedge.exe 64 msedge.exe 64 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe 4692 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 64 msedge.exe 64 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe 64 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 64 wrote to memory of 4020 64 msedge.exe 83 PID 64 wrote to memory of 4020 64 msedge.exe 83 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 3648 64 msedge.exe 84 PID 64 wrote to memory of 4312 64 msedge.exe 85 PID 64 wrote to memory of 4312 64 msedge.exe 85 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86 PID 64 wrote to memory of 3056 64 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cf1041bfb704f691d368d40e42c6243d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdcc5046f8,0x7ffdcc504708,0x7ffdcc5047182⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,2314041812295907377,7812453705879999722,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,2314041812295907377,7812453705879999722,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,2314041812295907377,7812453705879999722,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2314041812295907377,7812453705879999722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,2314041812295907377,7812453705879999722,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,2314041812295907377,7812453705879999722,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1972 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4692
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
6KB
MD5912fafc40e8803a554dbd72b90d46861
SHA1a5200e9c87c057a020e057ec171c0aeca3805036
SHA256d582c5d398c1383ac93679324f7a21f154a4c5f23b20678706b740547ee57c99
SHA512d6537bdc9bb937bd8908f436dcbe18c00b1dccf14deff99d64d2421e14eef1fb845b3b92b627dab5b5c5aceaeeac8aa7c8b9378c800da75487d4c2f0e2a07f47
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f6d631d6-e0df-4a3c-9859-e605546b2264.tmp
Filesize5KB
MD5bacce3d9b600eef31b076f7ae828f77f
SHA1e362f9ccbe7eede93c515ec7745ed35c04e5ce06
SHA25669bbf404235dbdc417dd4c54796469650d7069e9c53db990dca3aa925b53fc52
SHA5128f89b090676c773b5b3559ba5cf3dcac023f0f05073cbdf5ef728c73442561447bb972850797974a426b5398235030e2e030d97b64fedc12b02878b8493979ca
-
Filesize
10KB
MD574350292bdae23b9c9b91ee48cbd579c
SHA17c7e2586edfabc0d996cd2ea642d1068efe69a9b
SHA2569d6aa685e89b6de95f9c02bf500c40b6e3ac79b4171d81e0ad65633812b64bab
SHA512c2d124aeddcd8bad1babd9116c28b05062841657606e470c09362594824df06054d748dba9da592e9525592b63631d063ea60e5a581d2cac23d5d69cc3da46d6