Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 16:40
Static task
static1
Behavioral task
behavioral1
Sample
cffc056c29f43cd917a422e6da32cba9_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cffc056c29f43cd917a422e6da32cba9_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
cffc056c29f43cd917a422e6da32cba9_JaffaCakes118.html
-
Size
139KB
-
MD5
cffc056c29f43cd917a422e6da32cba9
-
SHA1
b67bedca384842751a1abbd0df1c120c1f4b6e16
-
SHA256
54e610c1f602489b842b4554892d56f4c73210d7b1bdc42721ba497900b47164
-
SHA512
8dc448a244a430678fb957b5569bcb0614bf2036a1e855e2141890d05e9f6be9ec11654d2be2f343a49859cafb93f358ce352b48b796638179eadaeb8fba8018
-
SSDEEP
1536:SIFNa2+uYbKlklJle7rMyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:SIF6l68yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2428 msedge.exe 2428 msedge.exe 4344 msedge.exe 4344 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe 3976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe 4344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4344 wrote to memory of 4548 4344 msedge.exe 85 PID 4344 wrote to memory of 4548 4344 msedge.exe 85 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 800 4344 msedge.exe 86 PID 4344 wrote to memory of 2428 4344 msedge.exe 87 PID 4344 wrote to memory of 2428 4344 msedge.exe 87 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88 PID 4344 wrote to memory of 1316 4344 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\cffc056c29f43cd917a422e6da32cba9_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc437c46f8,0x7ffc437c4708,0x7ffc437c47182⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,16289781808029622083,5787511795406856684,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,16289781808029622083,5787511795406856684,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,16289781808029622083,5787511795406856684,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:1316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16289781808029622083,5787511795406856684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,16289781808029622083,5787511795406856684,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,16289781808029622083,5787511795406856684,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:904
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
6KB
MD5c82361e6539d22c592a44ff204b47ee0
SHA1e316377a1d3df7a0d107fb4fff7547be4207af07
SHA256791c21522dc28711ab585a16ac058061ad9e69acbf21633b16804adaa95de84f
SHA512af755d7d0ee6fcfa465aa1522a308723a93f3324dfd7ba905ba9bb0ee0048b40b8dc8850a784c0f521d68605411b898d84fed525db2efc03182241218a64b6c3
-
Filesize
5KB
MD509b81023bf1b97788f0e0cc57dc65c05
SHA10f9fef42e07959f1eeec8af28c1c046b89fb5825
SHA256890f660fd7293e65199b7570ff151e3ab2c3242145fe8c250e27b1a8f149bdb5
SHA51238cd8c0122a458ffa091e555f566baa5c4445671e034a2a5f1d5f1026689884c81d1b00fc7f11c60d1714111d660d3e57a5f0f325be2dc65c192a81a002070dc
-
Filesize
10KB
MD59dfcf59c0fa2b5a5470a0ee80469450e
SHA159402eaecc442e0204b59aead3aed4cee7d31865
SHA256223295204b81db2c31494259fdd7cc6887b1b52d4ae5ccaa55cd19bf7ad2015c
SHA512a62c18caee29c75f4d4834f7eed2015013af548866cbf05b544115829a9916635e3754033ae78bd96bab1fe6878e57808841596e81ab40eb56a21a1068133586