Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 17:05
Static task
static1
Behavioral task
behavioral1
Sample
026424addb798ef1eb167f79da57b0ee_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
026424addb798ef1eb167f79da57b0ee_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
026424addb798ef1eb167f79da57b0ee_JaffaCakes118.html
-
Size
139KB
-
MD5
026424addb798ef1eb167f79da57b0ee
-
SHA1
e808c83db0f471cb99e3e41c82cac3cd0f604b83
-
SHA256
9b5e550d2492d8a229909eee501bff7f4ce567990bcea3cfe52706ed70711df7
-
SHA512
be1edb441a06eb575284b6a81ac5b331a5489618ee5cadb6da16431c7bf9e9c10c4d42cf5e56ea511145263ddcc06cc019e150b40a3f7072ecaf5fde6a030da1
-
SSDEEP
1536:Sa2vpknKlJo1kWyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:Sa2uyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1612 msedge.exe 1612 msedge.exe 4716 msedge.exe 4716 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe 264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe 4716 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4716 wrote to memory of 4416 4716 msedge.exe 82 PID 4716 wrote to memory of 4416 4716 msedge.exe 82 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 3472 4716 msedge.exe 83 PID 4716 wrote to memory of 1612 4716 msedge.exe 84 PID 4716 wrote to memory of 1612 4716 msedge.exe 84 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85 PID 4716 wrote to memory of 1788 4716 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\026424addb798ef1eb167f79da57b0ee_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8e3a546f8,0x7ff8e3a54708,0x7ff8e3a547182⤵PID:4416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,3688890777337055836,7888999967121289157,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2000 /prefetch:22⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1972,3688890777337055836,7888999967121289157,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2428 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1972,3688890777337055836,7888999967121289157,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:1788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,3688890777337055836,7888999967121289157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1972,3688890777337055836,7888999967121289157,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1972,3688890777337055836,7888999967121289157,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4916 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:264
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4572
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5ab8ce148cb7d44f709fb1c460d03e1b0
SHA144d15744015155f3e74580c93317e12d2cc0f859
SHA256014006a90e43ea9a1903b08b843a5aab8ad3823d22e26e5b113fad5f9fa620ff
SHA512f685423b1eaee18a2a06030b4b2977335f62499c0041c142a92f6e6f846c2b9ce54324b6ae94efbbb303282dcda70e2b1597c748fddc251c0b3122a412c2d7c4
-
Filesize
152B
MD538f59a47b777f2fc52088e96ffb2baaf
SHA1267224482588b41a96d813f6d9e9d924867062db
SHA25613569c5681c71dc42ab57d34879f5a567d7b94afe0e8f6d7c6f6c1314fb0087b
SHA5124657d13e1bb7cdd7e83f5f2562f5598cca12edf839626ae96da43e943b5550fab46a14b9018f1bec90de88cc714f637605531ccda99deb9e537908ddb826113b
-
Filesize
477B
MD55e82e2135fbd4c585b5acade7ca631ad
SHA1734e4512ddc092a99e35daf5eb4dbe9eb449f6de
SHA256dc990adf1578dfffd8f18ae7ec85d3118ae7eba185c5dd1e5d731fe83f496430
SHA5121a8d3026cad25e27b10664b2157cc79aa2cb4063e8e79640bb82fd972ec2eb799d6b8f185e937fa6d1c16ad5882f66466ecdc2eb489f9109ccc680815d07b444
-
Filesize
477B
MD51006c25acf80d5e2d466bf9b88f2787e
SHA1cfe899b64676eaee09388951f5c93b459bf74c65
SHA256fa584351cb22ec2acba1287feb00c5ca0b3672ccdc64a28c2bae0944f1cf205c
SHA512fdb8265471cbaa21c8a131cbacc5041fa21923076a14378223acf51fe769c91bfc6727964554981bd556ace8deea2d093424e70e426d6c7dbb1e93f59b0481f9
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5f822acb606dd9ebae3e81d376e4be8a8
SHA1d4abcb2983becc1165bae5912a6b91ffee33747d
SHA2567fbeaed2f1c5b796929d8a1f979515428f7c412902d9eab9377589d92bfe2ac0
SHA5125b9ccd327c999b0398a8241a12b94e86701d1862ca83a59ca3158aa2cdf0ed54adfa1ab0e55cf97706dcbd049dd1fa1fda8720223bb7f25e1864d322d3a61c4b
-
Filesize
6KB
MD57b447a5c4349d0a11e465ec55e7cefec
SHA18a10670cda116158c13758039c9f5540c6af7bd1
SHA25686de7ec7c05aa593fabc52981130217c499e6aa3ed84f4de0e8414a2e8511dfd
SHA512e0b3f3bcb9609ddf5decf6bece27c549596c4e5d1bfc82ce9bafffc9b7167f4ff6a9c7e7aae3065c771fa7e485d2a3224da455f7e8495900ebd40edb89a4b974
-
Filesize
10KB
MD5af64e81271132068389a360addfadb78
SHA10efb2a840bf598f96404f894b30ceaead08b0b84
SHA256e0a90a1de32a13402c75baa02be0b24d02c4bee0401d87455915e3537dfc18f1
SHA512fad4c65a87708804cf4002a191b07bf61f096ceb658d23c282ba532356b174fe61c9d1b4e02a35de6a3901f9dc34b8d8e57818e749fb01f4b2c50ae4c4fa8368