Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
09c1afd2501b9c519d9708c78a3db630_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09c1afd2501b9c519d9708c78a3db630_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
09c1afd2501b9c519d9708c78a3db630_JaffaCakes118.html
-
Size
347KB
-
MD5
09c1afd2501b9c519d9708c78a3db630
-
SHA1
5256f1dcf94ee41a82a68db7f59d11c0adb7da99
-
SHA256
9cb18ebe416550c42c93513a1df428491f2e16886cc004c3816bc68c007d50d3
-
SHA512
895c97b79f7382c13d46075eff22091f0988c1daee76f7fefe8b9bee0a00de012d5bfa3e95156bae7aa4f86e7c22a0851c3b2f2b39c288acd220de6e97d13a3e
-
SSDEEP
6144:SVsMYod+X3oI+YjLNsMYod+X3oI+YXsMYod+X3oI+YQ:a5d+X3Jd5d+X3d5d+X3+
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1380 msedge.exe 1380 msedge.exe 4060 msedge.exe 4060 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe 4440 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4060 wrote to memory of 2904 4060 msedge.exe 82 PID 4060 wrote to memory of 2904 4060 msedge.exe 82 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 3560 4060 msedge.exe 83 PID 4060 wrote to memory of 1380 4060 msedge.exe 84 PID 4060 wrote to memory of 1380 4060 msedge.exe 84 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85 PID 4060 wrote to memory of 2808 4060 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\09c1afd2501b9c519d9708c78a3db630_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffba3ef46f8,0x7ffba3ef4708,0x7ffba3ef47182⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1974762051877428673,7959662249348450458,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:3560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,1974762051877428673,7959662249348450458,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2492 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,1974762051877428673,7959662249348450458,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2884 /prefetch:82⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1974762051877428673,7959662249348450458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,1974762051877428673,7959662249348450458,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,1974762051877428673,7959662249348450458,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2548
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD553bc70ecb115bdbabe67620c416fe9b3
SHA1af66ec51a13a59639eaf54d62ff3b4f092bb2fc1
SHA256b36cad5c1f7bc7d07c7eaa2f3cad2959ddb5447d4d3adcb46eb6a99808e22771
SHA512cad44933b94e17908c0eb8ac5feeb53d03a7720d97e7ccc8724a1ed3021a5bece09e1f9f3cec56ce0739176ebbbeb20729e650f8bca04e5060c986b75d8e4921
-
Filesize
152B
MD5e765f3d75e6b0e4a7119c8b14d47d8da
SHA1cc9f7c7826c2e1a129e7d98884926076c3714fc0
SHA256986443556d3878258b710d9d9efbf4f25f0d764c3f83dc54217f2b12a6eccd89
SHA512a1872a849f27da78ebe9adb9beb260cb49ed5f4ca2d403f23379112bdfcd2482446a6708188100496e45db1517cdb43aba8bb93a75e605713c3f97cd716b1079
-
Filesize
5KB
MD5c2d61eed7628faee17921f24cf8a2b9d
SHA19b91c68bc1367bad742010d11f7d0660561deb96
SHA25668e878faaf0be064d1a9086409d9a19160a0e544cb868eda0f00f564512bb694
SHA512cfbf348030a781b52a0e3ec03b10bbeaa8d248dc63d339bf8b5000cade3f9bfec7401fbcc73820972c2e614f18ac4be4b6fc2026a91122e2489f19db55d2bb0d
-
Filesize
6KB
MD5664d501e39536d86539cd9e63dbebc35
SHA1f84f2d54a216f635cc604b9bfbb1b4763b3d9b7e
SHA25687103222986eeac563cc2b1408b9ce7128ce5149b874c0655baed1395042b06a
SHA5124fd1371d51fbaf1089f02d791936951d3e6fe591b7fb3a7018b479329b668d5fb4a7852574a1dcba734917b233990d3884dfdbda5245546866e001cb41035589
-
Filesize
10KB
MD5d61c9d10a22484093f55186971d7375a
SHA16ca04c1ff9df3a087b7256990e8f812a6fce27ca
SHA256dd76b549202547dec89e5f12c0afa75a82c43c37ebcf31e80006bc36777a043a
SHA512696bd909f42e0520397ad0a4b4759bbcb1a375f730ec46fceb47f6d3ed65c81364b59377d70dfee96dc73d7b9d746f3d8f3a3fddf03ad20d46b3c56039fab72f