Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 04:19
Static task
static1
Behavioral task
behavioral1
Sample
2ab528cdd9622a615e1c0740502b6624_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2ab528cdd9622a615e1c0740502b6624_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2ab528cdd9622a615e1c0740502b6624_JaffaCakes118.html
-
Size
139KB
-
MD5
2ab528cdd9622a615e1c0740502b6624
-
SHA1
69ff7e6c467d68117899d0c7816a968bc019456c
-
SHA256
0c4acbd7aac8e5e2c9656e5989cbdbbf7025968e99211130e11e900db6d7fcfa
-
SHA512
758a1361c439e2ce801057d1d856213fc4e07a905cd583cbbf1442ec79e0f707e385575cdb22aa6afa3d5492374eea33e280a45063e28d3cbf07bdd94215c026
-
SSDEEP
1536:SEND4ozUpE/OYYdlxSTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:SEbYoTyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 2360 msedge.exe 2360 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe 836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe 2360 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2132 2360 msedge.exe 83 PID 2360 wrote to memory of 2132 2360 msedge.exe 83 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 2740 2360 msedge.exe 84 PID 2360 wrote to memory of 1232 2360 msedge.exe 85 PID 2360 wrote to memory of 1232 2360 msedge.exe 85 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86 PID 2360 wrote to memory of 944 2360 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ab528cdd9622a615e1c0740502b6624_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff87b2a46f8,0x7ff87b2a4708,0x7ff87b2a47182⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,18173271985729654617,6376669849213377412,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,18173271985729654617,6376669849213377412,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,18173271985729654617,6376669849213377412,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18173271985729654617,6376669849213377412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,18173271985729654617,6376669849213377412,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,18173271985729654617,6376669849213377412,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3864
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3608
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
6KB
MD54226f5d39f7df81f97ad2fc28de311b1
SHA140360805e9f7cf207575bd841086cc748d2871a4
SHA2562e512a60ba5a1b2d0ec9a3e85d096feab334cc74cfde55a1630837ea7ff0e829
SHA5121d1bc337a73d331a45be79a2c2c748c4be94f396f9f2736a8f20b4add844b480b78c1c8833562534d829dbf6a1620a3fa2e8059d63976536b0cd1b38a777fa4a
-
Filesize
6KB
MD5b402b27b896872b43be162b1c78e1045
SHA1dc9c34846fbda5744b73381fcd5b0783beed9974
SHA256d4ce3f590213e4ab562893a6d3031bb25a5279fdb78362ee16b2f5d6a1c024b2
SHA5129331f5bfa5d4ca3db35698d62c5de4a0f11f20dcd208ef2a3a4e7e81b46ff54bd4b1b81ec6932246148b5c2931818fd0c58f42bdf6f6dfb21e7635ef43c00bb0
-
Filesize
10KB
MD52e350022f760e6df43b68859e205e984
SHA1d4daeafda88a6c63ca82baad06c0f225836a3836
SHA2569004571b4c9d31e861488c536ea63a8fc6542e98f9a20b968a014dcf6904e616
SHA5122b8432973ce3a382d16c1725418c01a435b1e970e6f86d5546cece6968dbfb5c0dd26111d58577271746c5a6e8c1e5560f417f70a078c371f0307a6b344f99e5