Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
13/09/2024, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
de28182099290f94257a1c31fc16d069_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de28182099290f94257a1c31fc16d069_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
de28182099290f94257a1c31fc16d069_JaffaCakes118.html
-
Size
139KB
-
MD5
de28182099290f94257a1c31fc16d069
-
SHA1
2fa907cbd7f4f84bfe0c12f514c7a693d54d1a73
-
SHA256
b8b606ffd10011e182138ac578bc8f99cd3a66e7480c1082e5bae573b58ab1ae
-
SHA512
4f800de58acc8bf9d9d1f8a292ecc74d4f167f89eba111b9730baa1fc87875c017d3f2ec9ddb943327a73a7d90b873a86d0a06578e070a3e70a41299301084ff
-
SSDEEP
1536:Si1VwdjAuGhl3slBKyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:SigjLGL3yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5052 msedge.exe 5052 msedge.exe 2448 msedge.exe 2448 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe 4064 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2448 msedge.exe 2448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe 2448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2448 wrote to memory of 4488 2448 msedge.exe 83 PID 2448 wrote to memory of 4488 2448 msedge.exe 83 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 2668 2448 msedge.exe 84 PID 2448 wrote to memory of 5052 2448 msedge.exe 85 PID 2448 wrote to memory of 5052 2448 msedge.exe 85 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86 PID 2448 wrote to memory of 5044 2448 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\de28182099290f94257a1c31fc16d069_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffff40046f8,0x7ffff4004708,0x7ffff40047182⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8366393535884888155,119664380041094365,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,8366393535884888155,119664380041094365,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2348 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,8366393535884888155,119664380041094365,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8366393535884888155,119664380041094365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,8366393535884888155,119664380041094365,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3344 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,8366393535884888155,119664380041094365,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4064
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1780
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD581af225dfaaea735315ea86fff2a278f
SHA1c30f27e5b02d2cc240416ccded928bfbf4eda54e
SHA2569dab1a0a93b2af6971ca25aba989d3a565f2a1a356e624bc3749ca7b6c60678e
SHA51282cfac0c66f13afc7561362b4746010410ba38f2e236d2370f5311e831d3980d42a5a2939c11027d1ae06cc37f482bb0804ebf2f94f1b75fc545913b34775a1b
-
Filesize
6KB
MD580ab030d133152ea5123dc48e8835d03
SHA19777f14bf137bb855280e3d3034b8c8e31c35169
SHA25641a3ac3980eed2211483369a977885ab5ddeed9ccbe9f8a6c8c0051aa2bbfc86
SHA512863f0a3dab70b831273bd7edf77612adff7544bc809a3f6566ca5ad14a170e03bc195fc58c259da5e5cf6b429284bd3f806830e340b7865166c5fca843eabbb0
-
Filesize
10KB
MD51b6da1ce77b554d410ddceb1dc971955
SHA18cb5f279779e0d93c45ba042506b0e08a93bff22
SHA256a8d78b10ff7a68ba71b9d27ecf5d4131f252058c7e2f4e8d4bec0673fd5a0efa
SHA512c7d183f308cb37a9e5ae1dbe64d6ba2aa14eae1186d343491a41618cf338505895c1eb74b4be436775a0d17621bf751dd0895dba907c721781bbfebd9f477624