Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
0090a9ba06a003aa396d7cefcbad95ce_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0090a9ba06a003aa396d7cefcbad95ce_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0090a9ba06a003aa396d7cefcbad95ce_JaffaCakes118.html
-
Size
352KB
-
MD5
0090a9ba06a003aa396d7cefcbad95ce
-
SHA1
a06a45eecd41e57023f66289a5df6caa33fd7bce
-
SHA256
1e0198016a7aa5186f4f894c0d72cd3b0e8818f22dcaeb34be4a42a6101b8c7f
-
SHA512
251ace0e52cac040b6cd7b1c095b95c60db7fa9a61444a99d45adfa64f0f70a5bc34b1fe270e27c6bc12bb11ad2711be8838747f867213f0399e671611a3ad11
-
SSDEEP
6144:SmsMYod+X3oI+Y9Cm6917m6fDLWWSph9YDuhYNLoQ:75d+X32mU166fDL2r9YDuGNL1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2276 msedge.exe 2276 msedge.exe 3060 msedge.exe 3060 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe 5052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe 3060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3060 wrote to memory of 1184 3060 msedge.exe 83 PID 3060 wrote to memory of 1184 3060 msedge.exe 83 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2856 3060 msedge.exe 84 PID 3060 wrote to memory of 2276 3060 msedge.exe 85 PID 3060 wrote to memory of 2276 3060 msedge.exe 85 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86 PID 3060 wrote to memory of 2964 3060 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0090a9ba06a003aa396d7cefcbad95ce_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba9d046f8,0x7ffba9d04708,0x7ffba9d047182⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,8330285826882095911,153879597233020658,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2208,8330285826882095911,153879597233020658,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2208,8330285826882095911,153879597233020658,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8330285826882095911,153879597233020658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:2024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2208,8330285826882095911,153879597233020658,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2208,8330285826882095911,153879597233020658,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4640 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4824
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4024
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
183B
MD5a28fc8c7b408c9fec7eb29ba72319a1a
SHA12b1815d04fb077e076a7c078db984304b82cf50e
SHA2561d26a34f3b686ef9b0f4402fd77dbbf4e517c3a60d31f19751f038953abe9e65
SHA5126a6f10e0011b2e2f335d65b2b5da07e47e06aa5eeb22ac8950f63928c18242952d216526c8a2ba909ad04fdaf073215c4277272c6de2a28c7cb39a211f0a78bb
-
Filesize
5KB
MD50a7771929afacc6a007ada751d65539c
SHA160dece3593da2b9b66f0fbbc5ab3a9b29e721a27
SHA256a5cf8e69eeabb8ba641a6f4d5fd8b0a39647639aae514f1d5039792edf078e6f
SHA5127879325a563230538af7e2fc954b9df952b364ae43f881b11dc9967b2a1c61b5c6c4efe95440dc364db9983afa674b123571a6043040ebf45872601dcf8bc700
-
Filesize
6KB
MD533474b2bf156b127877828b6b34fd4b7
SHA1a484c12ab32ec856cccc0072faa4d2a879f14519
SHA256a615f0d7faac8e8719e52848d84280cb433b0d7c4a0b2194112fd575c5d4fcf5
SHA512b047dd739b7a942672bacebbe9ffd820b82e3bf7881625f12d5bd92be3f9812b69001fd5e6186ea47839d7d758ed074c08c7534e92aebee1e8c17e7f5427dab3
-
Filesize
6KB
MD533ede2d4bf77a96edf1dcbe0215c9435
SHA109597ab23e65014cc37402a575da7a3093800c10
SHA2567627b44c73bfa225a83437b125e3d378a1fc4a93edf7d0f183fa6f3b1e3ef55d
SHA5125c2c0143dfa4e13060d16b3d7922562051dd565d649a370b473bc5eac584ec71938f4464ce8313a5f28ced456b45a0ef82ebe537204b87385321d2138ff21ff7
-
Filesize
10KB
MD5fc404a215bfc1388a3c55af987d7a8e8
SHA1b3970507d013c13cd2df71dab9cdeed577db8471
SHA2565f8fa86f22c7bcdf737fa9594d842966d0fe6a722008ebb4e50ba1eb14d9c4b1
SHA5121e971ae6d7e85637cf8d781c7cd632e71131bbd3621b25a9b7fb11d6552a9628da5d75c343c00c426371652533819da64b97ac3a2a5d25097cf0a2d6ceb49bfd