Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 03:51
Static task
static1
Behavioral task
behavioral1
Sample
df6ff5bb688a538a2157f1d9f39ab024_JaffaCakes118.html
Resource
win7-20240903-en
General
-
Target
df6ff5bb688a538a2157f1d9f39ab024_JaffaCakes118.html
-
Size
8KB
-
MD5
df6ff5bb688a538a2157f1d9f39ab024
-
SHA1
b51485f19a06c6a29edd04635274a3b5ce3c50f9
-
SHA256
eed698311a03e6987446651b84425caeee8e4456f47bb9016478046447a13630
-
SHA512
394a858daf36a755552061697457d59ccffa583b3ab0533cd57b3cb366b371f290d648806013dfc47dded383fb839d2b953298455ff78569996f600b48c6da4e
-
SSDEEP
96:ss6/oNe63eEAUGunsSkqnsYGv2akChiGs/5s/DFBkLeDmn07oPmCKIqwtptkl1Qz:YoMiCbnr7imHSt8BFxEbrh7
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 2296 msedge.exe 2296 msedge.exe 452 identity_helper.exe 452 identity_helper.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe 5108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe 2296 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2296 wrote to memory of 3268 2296 msedge.exe 83 PID 2296 wrote to memory of 3268 2296 msedge.exe 83 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 1936 2296 msedge.exe 84 PID 2296 wrote to memory of 2036 2296 msedge.exe 85 PID 2296 wrote to memory of 2036 2296 msedge.exe 85 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86 PID 2296 wrote to memory of 2836 2296 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\df6ff5bb688a538a2157f1d9f39ab024_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffae1746f8,0x7fffae174708,0x7fffae1747182⤵PID:3268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12309626099484763718,3613568449121481772,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,12309626099484763718,3613568449121481772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,12309626099484763718,3613568449121481772,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12309626099484763718,3613568449121481772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12309626099484763718,3613568449121481772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,12309626099484763718,3613568449121481772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 /prefetch:82⤵PID:4208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,12309626099484763718,3613568449121481772,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4740 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12309626099484763718,3613568449121481772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5212 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12309626099484763718,3613568449121481772,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12309626099484763718,3613568449121481772,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5440 /prefetch:12⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,12309626099484763718,3613568449121481772,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,12309626099484763718,3613568449121481772,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1764 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4388
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
203B
MD57f682555b9a717fbdfa40e3e6a705279
SHA1bf3ecf42fd4ecaab2a2651b44404f99c9d636a9f
SHA256aef3ac61b005edc44fdf0e7c664427ed0f111adc79e78d3d1aebc567b57c6b9c
SHA512789156d84687970b385dde02666d53ce4e15f3918edeb6b01ec84869c2c993aa640e99bbc6881ba85500f29ea26582ad0e72f5f5e63087b92caaf3fb8fa68c0d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD55fe09fec121fe7c8c30d38898c38e754
SHA17a74f71573e4a105294f9922d85fee2336d95db3
SHA2561bc8d6ad4ba21f82fe91d3178f1332c513beddde6650bc00b1084a6f7f0464a1
SHA512047deb38fd0012c9038c2cbb63ebaeabaf121be1292f5cbff001fbe5f45e56e84503f96f607ce8f428a40b8e16d7bd949bf329d7f19e8494393090fa4a7e1598
-
Filesize
6KB
MD54574d52e4e2e2aa04f89245f637570ee
SHA1f8990c9061f2931e12cbbb201dbe480b6f4412e8
SHA256d2bd05ef60a0cdcda33bb58bb730b6761ffd821de8076d9067d99b2faa150063
SHA512268118852ae6b9e63a2d28a89578d5f04acd2e58aae890f2399b181a8804d9f4d6a216d42a66e493beb87e8b2129bd01a28f12dc3246652d22e335b783b9d8bc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f49adba5c40e803a654e7e21930559c6
SHA1f59607cbed3077224b65c90a8e9eafff1561f04d
SHA256c26284d8fc8466f31938e18a6f8fc68ac1f7e4f54a72b90a4cf38ae28f4863b0
SHA512b832d0d7b9587a734d6a271025502ed64842a5d669242dd00b5a1ef2679e0d7cccc490b4927718bd50ec0e727f8ba9e9ba2c284644be8cc84aa32446e4cf3bae