Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 12:23
Static task
static1
Behavioral task
behavioral1
Sample
f601b023c96d3681271bb299047e3160_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f601b023c96d3681271bb299047e3160_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f601b023c96d3681271bb299047e3160_JaffaCakes118.html
-
Size
139KB
-
MD5
f601b023c96d3681271bb299047e3160
-
SHA1
749f75e324bf7788a492a7d6785398d7975230b6
-
SHA256
efe7d88733cd81cac63532a88fc5edff04c61b371f8331c955cc66613cc4d469
-
SHA512
f6c8a5cbd4754c765055f13630c28ce564d6be24a00ab66c6b49109e9f10bf02ac2b33020e21e16f215d70f66e39e9d1674075121a7d26da98b6ebe09a8b226d
-
SSDEEP
1536:SfrgUaupSlKyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBw:SfUAyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4272 msedge.exe 4272 msedge.exe 4228 msedge.exe 4228 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4228 msedge.exe 4228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe 4228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4228 wrote to memory of 3452 4228 msedge.exe 82 PID 4228 wrote to memory of 3452 4228 msedge.exe 82 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 3172 4228 msedge.exe 83 PID 4228 wrote to memory of 4272 4228 msedge.exe 84 PID 4228 wrote to memory of 4272 4228 msedge.exe 84 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85 PID 4228 wrote to memory of 3356 4228 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f601b023c96d3681271bb299047e3160_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff97c7046f8,0x7ff97c704708,0x7ff97c7047182⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5849210689280827635,14763463174178057006,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,5849210689280827635,14763463174178057006,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2360 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,5849210689280827635,14763463174178057006,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5849210689280827635,14763463174178057006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,5849210689280827635,14763463174178057006,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,5849210689280827635,14763463174178057006,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4816
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
5KB
MD5fbd3c8c4da408afc0758adc3f1ed7b8f
SHA15c245ce64f1b44bf0131f50c7ada2d817c7c0f8b
SHA256e562565b50f02b41bfb78531ee0f3d35620e3578ace428a0a6fd20e1e3b3d185
SHA5124aa003d02188a52edc2654f28dd57e5575fb52071e33e39a910f1016da8553ba38a47dd2c8a5d26d435e6f57473049ef9052d188a4b412b0a083b24bf06f563d
-
Filesize
6KB
MD5f7fa51aab98936616b33b7b841bb0277
SHA1a676180f1f32cc554cceff2c7edc0928668d98ac
SHA25672630485aadbfac959eaec9146820dc66fbda22f523eed7aaa9cdb11d7bc40e0
SHA512f7b80be3cca8c5d55ae81af1ffa2d63345095b37c935bae71044a68d9ddff092c2aa1452edee8603825b3f28b25c412f55a39f40fc70b628b7dc4bd521f1faf8
-
Filesize
10KB
MD579e998a4dd01ee319933b2b72b45d1d7
SHA187c6e9f013f9def15269991e2d676162ca6527c7
SHA256e5af00bedebc22353969439ab996990730f5882e179a06cd1ed54db969617ced
SHA51247a0e23ed7d23ce97280af7f1d3b6e9651a1a09cec22e9ca1dfee35f409f7a8c2b1c8d49dfc9770a5e728e91b29cd5880ba17ebe44b0750048f50cb2c7d2c7d2