Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 20:13
Static task
static1
Behavioral task
behavioral1
Sample
0318f730dea9f2e7aafcac59ac4c2c98_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0318f730dea9f2e7aafcac59ac4c2c98_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0318f730dea9f2e7aafcac59ac4c2c98_JaffaCakes118.html
-
Size
139KB
-
MD5
0318f730dea9f2e7aafcac59ac4c2c98
-
SHA1
2e4a9548dda399b8aeb42468ae3d644964d3a1c1
-
SHA256
7910f63a459290e248124507106fa36f17d09586cc250872df36a1205612e583
-
SHA512
f84873c206aa0b1fd9516da921b09bbd50b2eb12911d294fb9f2380ef58f8257791a75a03f27322117ad381ead75a40c85ad8a837fbc41b7a79c19f3194d2ab7
-
SSDEEP
1536:Scwv7Vlj2aBTtQD0tlXmzluyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP06:ScwxyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4484 msedge.exe 4484 msedge.exe 4876 msedge.exe 4876 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe 2248 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 4632 4876 msedge.exe 84 PID 4876 wrote to memory of 4632 4876 msedge.exe 84 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 1924 4876 msedge.exe 85 PID 4876 wrote to memory of 4484 4876 msedge.exe 86 PID 4876 wrote to memory of 4484 4876 msedge.exe 86 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87 PID 4876 wrote to memory of 2744 4876 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0318f730dea9f2e7aafcac59ac4c2c98_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8ae1246f8,0x7ff8ae124708,0x7ff8ae1247182⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12936104639483158418,12718007082121747369,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2216 /prefetch:22⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,12936104639483158418,12718007082121747369,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,12936104639483158418,12718007082121747369,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12936104639483158418,12718007082121747369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,12936104639483158418,12718007082121747369,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,12936104639483158418,12718007082121747369,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1664 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4304
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
477B
MD583cbb3d33d982f7c5c22f71d25b148d9
SHA1d0bb0ba9099ac551c59576ef47ca0deaebd63e7b
SHA2569b98522c3a066022ad50c5395afc47265226592dbcca20a07157a888f09b018e
SHA512c76ad871a48ae570f4562b6029e61763d457fcaed8af698591fb7cf07a049d23e9f494e5915830b229c1448fa831f838fde6143c1912885fd2be56c58d0071cd
-
Filesize
5KB
MD588d1ef6a8f8ace39979c5540296debe5
SHA16ddafefb334dee76fc281f8266f6c980073c04be
SHA25693576a547af67f2ccf3605bcdab9662eab28e8ecf60ee6c9457aac12dbc9bf02
SHA512da3ca4a8fd059c8ffa823a2661923699b473dc8d172cd36983de6a3bf957132c7670ba80f4c91583485eced057f0547e8bfc7f3359d45346d80703961b9f4dab
-
Filesize
6KB
MD5f87bd3368af3424407501ca841451aff
SHA1059c1505e20757fe2e410d039a701e31e5f745d2
SHA25685a77a4a77c5c4fcb58e6973f48ecea0ae3d61e8d4b2d738f967282243c04c47
SHA5125772a530184b332ec796f6ec897684486a74afb9e06651415d8ae9257b45fd3655eeb93f2322433487987ae81b66545be8051b118c1f4e8d0f7d19e04313fb95
-
Filesize
10KB
MD58c156cc5c45f8c8d4b7aeb684b76b536
SHA10073ad7a5a17c89831435ade82c54e3ad9a5603f
SHA2563d4cb0ab588b1f2d1b43c8e2da6bf9d59cd91aeee97c55f39b275156c3b19536
SHA51260304f7701013aaf37cb68c87840e1388db083a82adb78377d6d4972653e2f3ae2ef3a29102f8c1529a896db16cdfd818a5072a0ca1f6a12d4156b9d210277a2