Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 19:21
Static task
static1
Behavioral task
behavioral1
Sample
02e841b088be34eb6d34e1fac7ee027f_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
02e841b088be34eb6d34e1fac7ee027f_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
02e841b088be34eb6d34e1fac7ee027f_JaffaCakes118.html
-
Size
10KB
-
MD5
02e841b088be34eb6d34e1fac7ee027f
-
SHA1
a36ada991b70ef1f094f4779301a9e95ff46127e
-
SHA256
b01988adb55440f96b0088b16588d844e0100b15cb75e2be54c0064a9b032b91
-
SHA512
740f8f95107fa0c5bec6c2316f73158b84c8ffa04e088a8f7e418a2f8f4034f176679cfb23e75253ac930a1276204ee5daa419eb817e3b159d7e9e75f12af4e8
-
SSDEEP
192:SII/poUvd/cNHV4T3DZGdPayGnpooXpA1GPQe/Euu+a3iU:SIUoHDYGdiyGnSoXpKG1EuNaX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3056 msedge.exe 3056 msedge.exe 3824 msedge.exe 3824 msedge.exe 3656 identity_helper.exe 3656 identity_helper.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe 844 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe 3824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3824 wrote to memory of 4204 3824 msedge.exe 82 PID 3824 wrote to memory of 4204 3824 msedge.exe 82 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 1456 3824 msedge.exe 83 PID 3824 wrote to memory of 3056 3824 msedge.exe 84 PID 3824 wrote to memory of 3056 3824 msedge.exe 84 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85 PID 3824 wrote to memory of 324 3824 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\02e841b088be34eb6d34e1fac7ee027f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb026546f8,0x7ffb02654708,0x7ffb026547182⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2952 /prefetch:82⤵PID:324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5732 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:12⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5504 /prefetch:12⤵PID:1188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,984951375955925807,18414315540129032726,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4928
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD5ff22fdf9f8dfa2de0aa7ec7096ec1e50
SHA19c8822e7361cd15e79eae51667d294f3928c8a4e
SHA256934541578a2ad12a2a167c82b309d2497ad5235cf5086292233ee674f359f75c
SHA5120745d1560708a21a6baa5a104556f0b512059991a0e6aeb767570d84e544bd857b9a5c14686e11485ffc36bde52e0ce88343137a95ca67e4ea1506d3ae1ccb1a
-
Filesize
6KB
MD5fcf75d1ea10c191606581bc8d06650be
SHA1f705c8c62a9e2c750be7f0c3163ed747a6843b68
SHA256890c3d800917c1c4accc084d12b2f27a85756d47397a0b9cac4a9c572d88dda2
SHA512059f8bc72e1a192be75adc8f81a50286571d017be3675f004d6fc1a36cf06acf74c43f26887fe814449d4c6482a9aad1c07ddef7703ae30cdacc4a72aee18048
-
Filesize
6KB
MD52017d3be7d6f682cad0e6b5c5b56f99c
SHA1ee1996ab49ea029586db580253bddef7589a8819
SHA25673ff40378a10c0a7f81bae75aa5e34c6e80b8abff1cba25acafd6d4045045807
SHA51226eb117b994afb873dc8286d97621e92c1af139a5dd96f209de6dcff68900b8fd0c6f72b993a6bfd1166dd0a8bc55f63e149e3fcae9db5a9677f1078728f1c1c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5db300db30b6b5e3fdd8c20ba1d84094f
SHA1caceb194e2c4d8c1695ce5aa81eb9da318f9b932
SHA2567cec0f3f586386d85749f9aa04db034a07feb8000b57224264d4e7e14f8e512e
SHA5126a7648c7a1b8e4e2edaed7f7ea00a122d57512f155b8a4d24cec1362c02e68b107560ef995cb4986d248d8b769f1cf2ce5357ca99efd601cd5e6a69e80e15a8b