Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 12:29
Static task
static1
Behavioral task
behavioral1
Sample
efcbcb1b3984d95b44e89f2278cf4044_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
efcbcb1b3984d95b44e89f2278cf4044_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
efcbcb1b3984d95b44e89f2278cf4044_JaffaCakes118.html
-
Size
41KB
-
MD5
efcbcb1b3984d95b44e89f2278cf4044
-
SHA1
5a1d0679b84152af89760f6ab96c584fd8e3e82a
-
SHA256
a605bfe168290530db75387b438fd1ce2b5c62e7bb6bf7d3ee54fcf4f6df92f6
-
SHA512
c90e0e20ed511c39fc997b9197b695dbf2e58aed33c9ea4466a86336bb796b338efb0704c11197bccf9781205b735c0a200c6033766a91c5c61cf98b1e956089
-
SSDEEP
384:72B3iHaY5LqrE8eFCKdEnP/mrcYbCuBiEbBLi53u0ZugE0zmCm/w6sk:72BcCjY3653lZugE8mVZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3244 msedge.exe 3244 msedge.exe 1896 msedge.exe 1896 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe 1332 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe 1896 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1896 wrote to memory of 2764 1896 msedge.exe 81 PID 1896 wrote to memory of 2764 1896 msedge.exe 81 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 1692 1896 msedge.exe 82 PID 1896 wrote to memory of 3244 1896 msedge.exe 83 PID 1896 wrote to memory of 3244 1896 msedge.exe 83 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84 PID 1896 wrote to memory of 4244 1896 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\efcbcb1b3984d95b44e89f2278cf4044_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd65d46f8,0x7ffbd65d4708,0x7ffbd65d47182⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3830808557534893846,440924893644925856,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:1692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,3830808557534893846,440924893644925856,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,3830808557534893846,440924893644925856,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:4244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3830808557534893846,440924893644925856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3168 /prefetch:12⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,3830808557534893846,440924893644925856,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,3830808557534893846,440924893644925856,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2568 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1332
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:232
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\60cf7c81-dd3b-4669-9269-8d1524377c42.tmp
Filesize111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
5KB
MD50688d3f3e88aba9b595cf9c615e9d7ef
SHA1c6a274dc239b4725362ee2399a11a0a150be127f
SHA256024d1301b37a6cc1c34be921f94431f55e6ee8cd6169126cf62cb2dbee71ef89
SHA512c2a6de5e5f74c8a7c34db7135cafad6db235d89f8443e5cbf6978ec87464faf228be823ed0d359026ba38a15f7adbc95a6a59674947cceaa2636faf60d12fdfe
-
Filesize
6KB
MD57fc721c80a934c809bac8f5f26f5aa5f
SHA18f9b9b90215df9c7c060b73933e15352b00dd388
SHA256928b0ba60927512a70c6967288d9fa3fecd865d81f9cfb3a43f0c42f404dff10
SHA512e1cd1b96400da3985d11942f49c14d4c348ab77e74c1677ad16806293872c849bc77be99bbec3b30c2fae6fcafc48f7d32c888510c09fb9a06eea719c35a7e4b
-
Filesize
6KB
MD5a73d921b2c4f984e8699730efa9710c0
SHA10ddc1f34316df22d81fe2fb034f4a60c76cf119c
SHA2563c34cad66118cad6ae08ab678afc0af1bf0b2f3021af1f2b325f7128edc729af
SHA512238488c4ff625c28afc14bae62f15676d109f55e0262cc5e83e7293f67a8dd61eed635274ec81f9543ab7416316d3615b5f5803cb219bba29f59f20adf69bbe4
-
Filesize
10KB
MD5d5279ae6e424f1a5d623e09897ee9113
SHA1ce22a822bed60dd65022912b271de6c2a24d1dfe
SHA2563600c48db4023e3b32faa0fa45dadb350f2d7bc69114f0dd6eb9bca33e4280ca
SHA5127db20680c696766089010ae6b47a1236162a9aeb9a28d5dba08c9d173cccc09f4050d991406a81eaea7d948fe3f35fd3350e0b9e9a3e8ae17cd2e4d3d71615e2