Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 09:05
Static task
static1
Behavioral task
behavioral1
Sample
d192de5f208a3aafb6a1af8f939e8fc1_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d192de5f208a3aafb6a1af8f939e8fc1_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
d192de5f208a3aafb6a1af8f939e8fc1_JaffaCakes118.html
-
Size
139KB
-
MD5
d192de5f208a3aafb6a1af8f939e8fc1
-
SHA1
5996642a201a26239e4d897d3f611740d140dc22
-
SHA256
ef293bd360206593e5b83d3b06850d952d5d2a8c1fcc3b388d750ac5cc581da1
-
SHA512
b587542920789f562ae75da0f0e209778ec1faf68f6a9faf62e618cb65c77091dabdb2c6a8749e35d794b72e2a4c0711e8e653891c0b11d4bc6f746c14c8701d
-
SSDEEP
1536:SFH8aqzXqdbKlCyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:SFwzXSryfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3804 msedge.exe 3804 msedge.exe 4788 msedge.exe 4788 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe 2672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe 4788 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4788 wrote to memory of 4936 4788 msedge.exe 83 PID 4788 wrote to memory of 4936 4788 msedge.exe 83 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 5024 4788 msedge.exe 84 PID 4788 wrote to memory of 3804 4788 msedge.exe 85 PID 4788 wrote to memory of 3804 4788 msedge.exe 85 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86 PID 4788 wrote to memory of 2324 4788 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\d192de5f208a3aafb6a1af8f939e8fc1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd9c0a46f8,0x7ffd9c0a4708,0x7ffd9c0a47182⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,8944903607249857048,9011978673246816378,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,8944903607249857048,9011978673246816378,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,8944903607249857048,9011978673246816378,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,8944903607249857048,9011978673246816378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,8944903607249857048,9011978673246816378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,8944903607249857048,9011978673246816378,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2184
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3068
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD50302c610b7ff54719868586f0918cb83
SHA1172f08d93f7b9f91c2c413e5019cb9d2fcd8d0ca
SHA256db72c7a0652d9d75cb2fb1da8f94b19a3ccb3d6c4493fee32bd5ad6c169b6ef6
SHA5124a46d154344120055a0549236719e356883a43adb8895ab55dd77789bdc530085d8adcda33d4c732d8213c46421c38e79fd3abf8e8718616ba58079b65412760
-
Filesize
6KB
MD5e3bb7f3ea22f4b749094a1adc7c5d61c
SHA13acc000822ef9cb12d18888b19004c92674092c3
SHA2563130964206cdb742affd99da38a2cfbd3259a8f68323e064ba3f2e56a4bab002
SHA51254c0bce4e71bcfac6cf061b6eab0eaf3452519304c95963ef5422c86b7f9928c4e28ba22d412b77b28fbe40d7334fc9ec0fdcc2b14d18973fcea9a62bfe9c183
-
Filesize
10KB
MD57735fbea9951a230d604f77386fb002d
SHA17d1906a93ff24ef4aafcff6b90dcbae808088988
SHA2563b56fca693f521bdb05763236787c025e1484793012168825a6443bb014584b3
SHA5121cf5b8edc1e3f5e2e7947c718a7fd3d6fd1819b66dc1a00be5ed4f5c8a5b125b2fcc81b2be731f45b7d76da0a790b71937e6a9d12958efdd5e49e35d7b452f1b