Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 23:00
Static task
static1
Behavioral task
behavioral1
Sample
df0ebaab1ea16f37bf0e1c69e74b3e46_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
df0ebaab1ea16f37bf0e1c69e74b3e46_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df0ebaab1ea16f37bf0e1c69e74b3e46_JaffaCakes118.html
-
Size
374KB
-
MD5
df0ebaab1ea16f37bf0e1c69e74b3e46
-
SHA1
b8e28fc88859bdd6ed5cdcced2132db6ce636d94
-
SHA256
e39cae3f884c7129c248a5f02aed9118dc333b50e268ad6d97982d7f0c53fd47
-
SHA512
bdf7f00f2421c2a45cfcec9bdec8eaf463c503fab3d06e63206dd594022e34f4b354ec8acf873cb87e55e627fe2cf7b4c3adc2d5e29a7bfe219c378ef8312d6e
-
SSDEEP
6144:SSasMYod+X3oI+YpKkbAL3WXsMYod+X3oI+YgsMYod+X3oI+YQ:X45d+X3SkbAL3W75d+X3Y5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1016 msedge.exe 1016 msedge.exe 4784 msedge.exe 4784 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe 4784 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4784 wrote to memory of 1920 4784 msedge.exe 83 PID 4784 wrote to memory of 1920 4784 msedge.exe 83 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 3548 4784 msedge.exe 84 PID 4784 wrote to memory of 1016 4784 msedge.exe 85 PID 4784 wrote to memory of 1016 4784 msedge.exe 85 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86 PID 4784 wrote to memory of 3496 4784 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\df0ebaab1ea16f37bf0e1c69e74b3e46_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffebc3c46f8,0x7ffebc3c4708,0x7ffebc3c47182⤵PID:1920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,6799487392487594119,988452382710138219,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,6799487392487594119,988452382710138219,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,6799487392487594119,988452382710138219,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6799487392487594119,988452382710138219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,6799487392487594119,988452382710138219,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,6799487392487594119,988452382710138219,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4796
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
5KB
MD5848dd031d6c78059edf0aca42dc07c05
SHA1d90fb4cd3c76b3b67fd9c77e45a46938369fc9ed
SHA256fa505b1bcc87537c610c0c0f83d09dfab6cecc523776d209418a44a1aa3bb233
SHA512b8f07c8dc815ff971b916015262f3437d470fcf00ddb35e6b954d58ed0feff38549fac57ab272e768210d32eecf214741236cbbd02e1530c2cc491d72e01df89
-
Filesize
6KB
MD52d891626966be30ec7ead5d415e1a3f2
SHA124370b13f2eb6bb2d993dece6183d826e88595cc
SHA25643f29e29d9bf82e1343e34d16fd745b3cde4239a5dfaef353a354ca93468e54e
SHA512f610c149e389594d97330b4a1c11adbf3a1a68af34f58782e7ffd68e19972c4a9e8082b28726eb506f26508bbb2bea4cd3756138447a0af75d089a915640bf77
-
Filesize
6KB
MD56e3e35404fcb815584e574f4a21eafb0
SHA1704174ebcb75391df319600ef9cc2167c3d19540
SHA25620ad3f15d8c198082eb4133dfa6259e8694f94d7b7f0d4b514ef28a272fbdd8f
SHA512dc7b4a9827853b4b36cdd960edb907b69d9a6e1d34990139c97979d5fb475dda28f9e59079d96358cd228a90907521d4e9f7a7434179b1acc3bf72fe9dcea95e
-
Filesize
10KB
MD527a594c2f799a57df2b92a865a920ba1
SHA139c6a1251047267bf31a0a100ebcc8d3885c2664
SHA25620fd015476e2dfe6929b9f6f40470de0746449c167e14638a443633ec9227266
SHA5126ea3698e619c06ad516a73d95c285ec889d4a71e44fbc204650690476baf954e8b95630a2fcccbc3bb5e48b48ad37880d3405bbcb3aafb96c95b0a20d51fb85f