Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
ef91bb4d4c303231315e37228412e8a7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef91bb4d4c303231315e37228412e8a7_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
ef91bb4d4c303231315e37228412e8a7_JaffaCakes118.html
-
Size
139KB
-
MD5
ef91bb4d4c303231315e37228412e8a7
-
SHA1
b9139a30064ca97a28e7d18aad07d2de36b1ae79
-
SHA256
6490271b1ce019e24f86bd82df6b5b39a7702dbea56fd9a3f2cf42804f131990
-
SHA512
be42a77d94003d04550d44a7b37bf7b059fc404c156209a660605156868a6abba0ff5cf7c03a1e8dcbd5069a75f0162dc3f8bc5b8b9d6b0430154ff9a3f1d741
-
SSDEEP
1536:S4NS9N8KlzZQyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:S43byfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 424 msedge.exe 424 msedge.exe 1324 msedge.exe 1324 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe 4984 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1324 msedge.exe 1324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe 1324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1324 wrote to memory of 2796 1324 msedge.exe 82 PID 1324 wrote to memory of 2796 1324 msedge.exe 82 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 2480 1324 msedge.exe 83 PID 1324 wrote to memory of 424 1324 msedge.exe 84 PID 1324 wrote to memory of 424 1324 msedge.exe 84 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85 PID 1324 wrote to memory of 2656 1324 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\ef91bb4d4c303231315e37228412e8a7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe746446f8,0x7ffe74644708,0x7ffe746447182⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7031540282634712672,14117026175183489597,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,7031540282634712672,14117026175183489597,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,7031540282634712672,14117026175183489597,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2680 /prefetch:82⤵PID:2656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7031540282634712672,14117026175183489597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,7031540282634712672,14117026175183489597,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,7031540282634712672,14117026175183489597,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4948 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4144
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ecf7ca53c80b5245e35839009d12f866
SHA1a7af77cf31d410708ebd35a232a80bddfb0615bb
SHA256882a513b71b26210ff251769b82b2c5d59a932f96d9ce606ca2fab6530a13687
SHA512706722bd22ce27d854036b1b16e6a3cdb36284b66edc76238a79c2e11cee7d1307b121c898ad832eb1af73e4f08d991d64dc0bff529896ffb4ebe9b3dc381696
-
Filesize
152B
MD54dd2754d1bea40445984d65abee82b21
SHA14b6a5658bae9a784a370a115fbb4a12e92bd3390
SHA256183b8e82a0deaa83d04736553671cedb738adc909f483b3c5f822a0e6be7477d
SHA51292d44ee372ad33f892b921efa6cabc78e91025e89f05a22830763217826fa98d51d55711f85c8970ac58abf9adc6c85cc40878032cd6d2589ab226cd099f99e1
-
Filesize
6KB
MD5fff7250b6a8b3709ead682085fb90e1e
SHA1eec45c79db8e26afd930281525f92b5788c767b2
SHA2562505397fef70d14ceae1598f794fc6d97df1a8a4d9381599c4bd24cba3bfc9f0
SHA51254e43b2c3014c9643f2fd16d29885e32e4eda93acd713102d28a1c2bba663fe5cb520e36d095fcd14a91d6ae17a8c363e46b439b6c545ac8f2d43369427b00df
-
Filesize
5KB
MD5e2eca047785fb60a25883e0eb6be684f
SHA13024e6008cb7abc2e49ebe709ea77343f10d9e49
SHA256d7be4f7369c71ebde455537a8158ad981c918c9cb55a94f863556eee9ad099be
SHA51245c4efd51d81b6d46c6e39c26319a5674e6cee2ecc3f880bcb2507b5d427d94938cb07dd594d9ed07d181ae97a2e2c979b0443295f43718e9d1c6bd855e0129b
-
Filesize
10KB
MD5cec856b4e2d7ca3d25e50d6b81533dd8
SHA132a23858042829579023499f4ca8c1cb402765be
SHA256853c45b0eb6b9eb57cb7d3e3857ffc4b2b1f9acff0f3d69c8ace4407452d977f
SHA512ea87ba54425a7b46259d9ccfc8a312176577538d961b8c948ed2aa424b3e3e3d1d99349262992bfd5f7ee919d8e7f240e42e1dd0844e05b82178fdf104b8e58a