Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 23:50
Static task
static1
Behavioral task
behavioral1
Sample
df1e56614619181e2792b0d5707b0ecf_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df1e56614619181e2792b0d5707b0ecf_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
df1e56614619181e2792b0d5707b0ecf_JaffaCakes118.html
-
Size
9KB
-
MD5
df1e56614619181e2792b0d5707b0ecf
-
SHA1
5af40561a8c3d2c4f13d9a388f19732a099764bd
-
SHA256
1d371bd49c2fa4ff5b3f6e6675206d0c910b0eb17752e2c3b29f650f4cca67e4
-
SHA512
40981a7f0ebbae88fb486575060fb2f8dd114599394b193c8f15e8c59601fe93820b9bda3556400cc2f45024f4e08dc2b7fa31536b97ad803b6f39d3077f9da5
-
SSDEEP
192:pFCXXRNXeXagKXMV+X3XB0lXfBX11h1TR9wgSGmlV62sBUo93uR5N3GlPLTcX5Sa:pFyaYMwn01NlRSgbkSeR5mIGpTyBp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1204 msedge.exe 1204 msedge.exe 4404 msedge.exe 4404 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe 4404 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4404 wrote to memory of 2196 4404 msedge.exe 83 PID 4404 wrote to memory of 2196 4404 msedge.exe 83 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1456 4404 msedge.exe 84 PID 4404 wrote to memory of 1204 4404 msedge.exe 85 PID 4404 wrote to memory of 1204 4404 msedge.exe 85 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86 PID 4404 wrote to memory of 3964 4404 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\df1e56614619181e2792b0d5707b0ecf_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9c78546f8,0x7ff9c7854708,0x7ff9c78547182⤵PID:2196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,6937952516951528101,15601096775852347394,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,6937952516951528101,15601096775852347394,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,6937952516951528101,15601096775852347394,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,6937952516951528101,15601096775852347394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,6937952516951528101,15601096775852347394,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,6937952516951528101,15601096775852347394,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=6088 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3032
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD562e4cf38695802f0300a8080a2e0f079
SHA198e6aaaa77b767c107acb1069f69be8f992a2965
SHA25615f837b8bf393bcb64da841be91209bb1182db56b959a83fd8b5c70e31f4b23b
SHA512a22634c3bf8c1054e558d983e8f1310968056f4e1ac20f5227e5b68337162ccba8ce058d7be0af7f6b12e0fdafc26f9e28d3eee8920b5c9cbc3745ef2a231a3c
-
Filesize
6KB
MD5a7f7d3a385a2399090626f18bd26871a
SHA156efe7c6c70fd9ccbf4310669b4982bd3719b1fd
SHA256763ca845cad252c60f3c564df7d23331f327178a95083da9f408a96ccf51110d
SHA5121dc3a65e526499e1c6b0c02330d0b3ed4bea5a49132b86f34c839ceff85e3eebdffc3a179ac20ef4632750cb3034570415570dc39585e8affe4f226680a3aa24
-
Filesize
10KB
MD58b87bafe6224feca8b261a8f1e5e0bd0
SHA192551fd140e41eb980bd219df67db26507f4c5fc
SHA256a47d0d08e1cbd9cc307e4e819e54c26de3edf3a2f3d623067e5f700f1ae85ca1
SHA512d79e59060cc2cef029068f04a36ff1fead43de3744b47571876c69befc7a50eeb3af3e2a314e4dea7d2498ecdadd28c8d407e41a8a7e32b5917ebbae73ac283d