Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
f9a829922a79ea8f9a7d032efda02418_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9a829922a79ea8f9a7d032efda02418_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f9a829922a79ea8f9a7d032efda02418_JaffaCakes118.html
-
Size
139KB
-
MD5
f9a829922a79ea8f9a7d032efda02418
-
SHA1
d1dd6ebccb6d5c565d54622476bbc9c4de7e6f56
-
SHA256
f62aaac085e0cfe7e48e18b95e6e57fac723949e22c6e611747b3df543cff0cf
-
SHA512
00ee9e7a63ae18f1ea1e8b550c40306b3a6de35f2ccb8a656d46a1d53b3ac1c1e942350d1b57b3237927e415d4a963e9f11c87dd284cc3936692036eddebb6ac
-
SSDEEP
1536:SccvZznODdBl+YeyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:ScckDdWyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 448 msedge.exe 448 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe 2784 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 448 msedge.exe 448 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe 448 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 448 wrote to memory of 836 448 msedge.exe 84 PID 448 wrote to memory of 836 448 msedge.exe 84 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 4020 448 msedge.exe 85 PID 448 wrote to memory of 2472 448 msedge.exe 86 PID 448 wrote to memory of 2472 448 msedge.exe 86 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87 PID 448 wrote to memory of 2324 448 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f9a829922a79ea8f9a7d032efda02418_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfbb046f8,0x7ffdfbb04708,0x7ffdfbb047182⤵PID:836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,100923959658376269,9931727341051927714,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,100923959658376269,9931727341051927714,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,100923959658376269,9931727341051927714,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,100923959658376269,9931727341051927714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,100923959658376269,9931727341051927714,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,100923959658376269,9931727341051927714,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4076
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ff63763eedb406987ced076e36ec9acf
SHA116365aa97cd1a115412f8ae436d5d4e9be5f7b5d
SHA2568f460e8b7a67f0c65b7248961a7c71146c9e7a19772b193972b486dbf05b8e4c
SHA512ce90336169c8b2de249d4faea2519bf7c3df48ae9d77cdf471dd5dbd8e8542d47d9348080a098074aa63c255890850ee3b80ddb8eef8384919fdca3bb9371d9f
-
Filesize
152B
MD52783c40400a8912a79cfd383da731086
SHA1001a131fe399c30973089e18358818090ca81789
SHA256331fa67da5f67bbb42794c3aeab8f7819f35347460ffb352ccc914e0373a22c5
SHA512b7c7d3aa966ad39a86aae02479649d74dcbf29d9cb3a7ff8b9b2354ea60704da55f5c0df803fd0a7191170a8e72fdd5eacfa1a739d7a74e390a7b74bdced1685
-
Filesize
477B
MD5b26c9dd75bd04866c2781c3d9ec75b34
SHA1527d5b2246d9dc12ad01044ba9965728e64f5ae4
SHA256075dc7dc808ee074d30dfdd2f1a3d73465df555b7791b47e531544e358fbe909
SHA512bd29b61ecacee36b8a3c86ab942cf92ef4fb679a8c8125a723f9b0607b6c417ff57a90019cc474f42ec622f9f15f5fb024e3b47f5389891a91932c09163ceee3
-
Filesize
6KB
MD56f573c27b9d1d11fd639b1ec6031812b
SHA1fc07b29d31ed70d829233b91956aee78d22c1285
SHA25647d91301b361f765cc464d0b82adef23d0119c1eeefbcec98df1002cf6486da6
SHA5128ea843f94e98ec437217b7be0fbf951ff0efdad213120acc26ebb0c393cc614acbae7a52c07fb9ea4e2a618efb6d9b245801dd8cca0a1dc1ae310f2dfbedb429
-
Filesize
6KB
MD511a20755ca4a15933f20ec073a2b14cb
SHA17df2cd0b7bfd48bc8b65e805cf5913d3c2b85fb8
SHA2565d745dc59b16a0b4f804761ca26774966c1000343330b8d219830971915ea8bc
SHA51281f07c5efef107483483f2aaeb2be29ed4910a4175a368b3f2732e4c3ef85e9c6d878bc41cf157ae70b7d825e3cb0af712c0e4b74d4f1cc2bfb76e013dc3de49
-
Filesize
10KB
MD547673238804269dff0f72d8ae41c5c90
SHA150466670b9fc8f1bece5a3a60cb81cf4d589df2e
SHA2563ec17d046cd481b4a8317becce82fac076c43a507ddf8a1b21a9f0793d8ec4c8
SHA512c6af93613d631fb0633687918b5941dc0080371839639789c055b85bd7b91364eb5aaf07fbe6e49b325e5e67213a8ace711f2574a75990673d57874d7f547ab1