Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 11:57
Static task
static1
Behavioral task
behavioral1
Sample
0130c77e4f7db9587c2c66708739fbb6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0130c77e4f7db9587c2c66708739fbb6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0130c77e4f7db9587c2c66708739fbb6_JaffaCakes118.html
-
Size
139KB
-
MD5
0130c77e4f7db9587c2c66708739fbb6
-
SHA1
1f6a1236b8dc899e36adb8a383654def90a21ac3
-
SHA256
092694531592fd9594fc051ab69e39dcc7d8cbb8d049010fbe6e94345245c512
-
SHA512
8d7c9b78e613086c578184e79b06f80944bd1a887fa03a185f0948ebbcfcc597ff0f8f4db99737fd2d5b79d9b09d46a012d5e6ce8e7629347028e01345721308
-
SSDEEP
1536:SENrpUjnWOv6rrlxSTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:SExWTyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2192 msedge.exe 2192 msedge.exe 1264 msedge.exe 1264 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe 4052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1264 msedge.exe 1264 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe 1264 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1264 wrote to memory of 2928 1264 msedge.exe 83 PID 1264 wrote to memory of 2928 1264 msedge.exe 83 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 3712 1264 msedge.exe 84 PID 1264 wrote to memory of 2192 1264 msedge.exe 85 PID 1264 wrote to memory of 2192 1264 msedge.exe 85 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86 PID 1264 wrote to memory of 4736 1264 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0130c77e4f7db9587c2c66708739fbb6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffae52946f8,0x7ffae5294708,0x7ffae52947182⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15544023564259918933,12958759592922638407,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,15544023564259918933,12958759592922638407,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,15544023564259918933,12958759592922638407,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15544023564259918933,12958759592922638407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,15544023564259918933,12958759592922638407,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,15544023564259918933,12958759592922638407,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3084 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f9664c896e19205022c094d725f820b6
SHA1f8f1baf648df755ba64b412d512446baf88c0184
SHA2567121d84202a850791c2320385eb59eda4d697310dc51b1fcd4d51264aba2434e
SHA5123fa5d2c68a9e70e4a25eaac2095171d87c741eec2624c314c6a56f4fa390d6319633bf4c48b1a4af7e9a0451f346beced9693da88cfc7bcba8dfe209cbd1b3ae
-
Filesize
152B
MD5847d47008dbea51cb1732d54861ba9c9
SHA1f2099242027dccb88d6f05760b57f7c89d926c0d
SHA25610292fa05d896a2952c1d602a72d761d34bc776b44d6a7df87e49b5b613a8ac1
SHA512bd1526aa1cc1c016d95dfcc53a78b45b09dde4ce67357fc275ab835dbe1bb5b053ca386239f50cde95ad243a9c1bbb12f7505818577589beecc6084f7b94e83f
-
Filesize
5KB
MD5804305f24394c41c2962ed822de21a17
SHA1d289d52c46dfa8375fdc8b3e412bc1545d8dd7a3
SHA256e5b6ed7c9306ee69da5610692c4aca4780ea790cb62575daff497288276d1d71
SHA512ecac913cc737a5c85c17b328dc99ca4b5bb5dedf3f05c3961310a1de6f897c354fc66e9aa3abb55a10602b5393fe1a84bc8dd0149d30330d9b95a16af533c78c
-
Filesize
6KB
MD5a6ca9c07280bc1113b290ea01e597012
SHA165fb088b6f7ceb31763b90d6f43752f2117a4924
SHA256dba2504d03b3316d905bc4939d1a79fcf3705e72142c6f71b2f5f69a49c19da9
SHA51292210865cb585e0f14dd56701ed5d18ed35491fcb27b3a6c1bf9421a394995dd5a5266757fc2b008dcd9f162b5050e565edcef2899cd0ebbba0e6c31aa7f8452
-
Filesize
10KB
MD523fe5e737a14c810dc911fd5d715e833
SHA114ddc73416a4a94b61b2d886f5c725d6075af2be
SHA256c9a998f519745bdb4a2cce1c387c48a88eb8dda2d76b3e02191ea5d124852b67
SHA512aa4d0e77ffefe28495670cce41b38d9d8977e9302d78fde2ee25f06b532ce1f64ec2d5d00e1ad54db1fb07b89e75f345cebcfd05f2c321535c6d984e936d4e03