Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
00f271871cb26ae4af53f4f5e6bdd05a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
00f271871cb26ae4af53f4f5e6bdd05a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
00f271871cb26ae4af53f4f5e6bdd05a_JaffaCakes118.html
-
Size
141KB
-
MD5
00f271871cb26ae4af53f4f5e6bdd05a
-
SHA1
1a635201f0465c77c5c1c84e6cff5c3e67bd4ecc
-
SHA256
0c65fa60ae465b21584f398a63b7d0e7a64558478e87d00b1338a34d0534c65e
-
SHA512
93d6ae32d63dbf0bfe809cbb148e7ef06ef5996d5eb4efe1b14a9aa84ecc670131e0845fb7be4e21ef4ce3bd30d422f7ba154affc9a68d9546706a1d6f371e74
-
SSDEEP
1536:Sk0rDyAGXrR0tkjx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wee:Sq7Lx7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5056 msedge.exe 5056 msedge.exe 4752 msedge.exe 4752 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe 3404 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4308 4752 msedge.exe 82 PID 4752 wrote to memory of 4308 4752 msedge.exe 82 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 1788 4752 msedge.exe 83 PID 4752 wrote to memory of 5056 4752 msedge.exe 84 PID 4752 wrote to memory of 5056 4752 msedge.exe 84 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85 PID 4752 wrote to memory of 5088 4752 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\00f271871cb26ae4af53f4f5e6bdd05a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe899d46f8,0x7ffe899d4708,0x7ffe899d47182⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5656303660017920297,4627996113095274951,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,5656303660017920297,4627996113095274951,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,5656303660017920297,4627996113095274951,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5656303660017920297,4627996113095274951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5656303660017920297,4627996113095274951,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5656303660017920297,4627996113095274951,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4936
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5111c361619c017b5d09a13a56938bd54
SHA1e02b363a8ceb95751623f25025a9299a2c931e07
SHA256d7be4042a1e3511b0dbf0ab5c493245e4ac314440a4ae0732813db01a21ef8bc
SHA512fc16a4ad0b56899b82d05114d7b0ca8ee610cdba6ff0b6a67dea44faf17b3105109335359b78c0a59c9011a13152744a7f5d4f6a5b66ea519df750ef03f622b2
-
Filesize
152B
MD5983cbc1f706a155d63496ebc4d66515e
SHA1223d0071718b80cad9239e58c5e8e64df6e2a2fe
SHA256cc34b8f8e3f4bfe4c9a227d88f56ea2dd276ca3ac81df622ff5e9a8ec46b951c
SHA512d9cf2ca46d9379902730c81e615a3eb694873ffd535c6bb3ded2dc97cdbbfb71051ab11a07754ed6f610f04285605b702b5a48a6cfda3ee3287230c41c9c45cd
-
Filesize
5KB
MD5e96adead3007b3fa937a76caffede19d
SHA1178e00cce26df49424ca1eeb69eff70bfbd196e7
SHA25622f9dd11a309787359846ee366e4112b637a54920ab72de607a9ac121139e35b
SHA5126617b4feb1dadc8dfd4e56ddeafdcc79fea15a9619565844abe2a0d0065c0569cde7f9324d057eb9b1c5869b5a59e0ce595677d7b76f410c85a39f3fc771fd57
-
Filesize
6KB
MD56fc86db57a7fd09f347b8bb35552a6c1
SHA10884b34178deb7aea1a0bce3d020572dd9ddab8b
SHA256ccf968752266c8b469b8c634cfe7838a33f978c654eb4206674490d41078376e
SHA512b907f7dfc60c74652583675db93b6a3cc4e96dcdf56a0743560b04e7d851b3f672af227031fc77c18f0edb735b026fd5f3c941a8b0f601403d0f82a2ce6027b4
-
Filesize
10KB
MD53d4868364405c4bf6d6abbe715b1454d
SHA19101cf697f6cfff2240f6f06c6cd9dfedf0dc541
SHA256b1ef8b3e81b33e793da5ce724b1eb29bef02266428b29f12de47f9dac8db6210
SHA51227d4391a996438cf5c7d5963a08d26dddb6ca2541e8da23eb4f82fed2a6d9dc1e9bc21dea4bd724ad1573f2774e49777ddf7a0bcebb92c40ebf87c4d8728f2be