Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
4637858297b40de76b526880bea17946_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4637858297b40de76b526880bea17946_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4637858297b40de76b526880bea17946_JaffaCakes118.html
-
Size
62KB
-
MD5
4637858297b40de76b526880bea17946
-
SHA1
e110d04fd3ffdcb1a38096044ecc4d5fc77727a7
-
SHA256
c93f4518fcee5cad0a10e43613c43487fcfbfd97b0a79a0e2ac874454e2aa48f
-
SHA512
71db2f48969f4e7c6da2a2ac59d1dcbaf660f6020fba94d7f109d506e9021334d13c86a8d06632058edc8433901d8fae11b85d56cc258f3220bf95415f506342
-
SSDEEP
768:IxtbDC6/5eyZXfI+uw8HNAhVtB3PFTeTmS+6GGhgtEiTTQmXhN/Hv1a7XJ0GkGV6:IxtbDFpG+uSnB3tCTmS+zjpM7XjaYtY
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 15 sites.google.com 21 sites.google.com -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4944 msedge.exe 4944 msedge.exe 1608 msedge.exe 1608 msedge.exe 436 identity_helper.exe 436 identity_helper.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe 4768 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe 1608 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1608 wrote to memory of 4144 1608 msedge.exe 84 PID 1608 wrote to memory of 4144 1608 msedge.exe 84 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 3732 1608 msedge.exe 85 PID 1608 wrote to memory of 4944 1608 msedge.exe 86 PID 1608 wrote to memory of 4944 1608 msedge.exe 86 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87 PID 1608 wrote to memory of 4456 1608 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4637858297b40de76b526880bea17946_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa907c46f8,0x7ffa907c4708,0x7ffa907c47182⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2820 /prefetch:82⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:12⤵PID:1324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵PID:2608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5636 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:12⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5416 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,7206246453726931232,16021614198768607770,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4800 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4768
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
1KB
MD5435457b380fade333c748197cbf7962e
SHA1c60ae20176a3566e2abb987400b59c9f77f1a48d
SHA25619b24f8fa863f9e1b10e2dae2e6c87642c3d1cc25c85ac3c2f39b8d856dfde0e
SHA5127959eaba6b871abfb0f93159a84fc6c39ee21b158e45723baa2bb8c77e37accb16110775f1014b653fdfcff303fa5d22cf80d00b774fea4968fd622e5178ef13
-
Filesize
7KB
MD5766136ce3129090a94a71be3143de19c
SHA179216ecf1c187c625fbc7dfb0153b4746a4a2aa0
SHA256e2e307ba7105120d9dc348b32d77b0dacceba7ac03706c9960fd416a9ade5aa7
SHA512dcfee7e3d0f34960f17ada5abc54546bf3c44c0de110a396f57b074dbe60f68b985bc97356fcbfd3ffc1cc93722e1120f92281652dd7798c8262ae1c96faef09
-
Filesize
7KB
MD5e85ab77ff4e0d2dd8a9d6a2097b3ba3b
SHA153d810bdb048b5c16b5094f381db239481e9a887
SHA25667dedea155a0d02b94392d66729b15c649d9647f861a75672aa574a4abbb404d
SHA512f80f0c52c3ae24791a7b0f8fe6fa6da3438469db75d6912b596277e5a9b39bea206f77f487c3558fa5b4f141757fbb4d3313c81170057497fb206fb344fddbff
-
Filesize
6KB
MD52c86319ce1add7aa9f688edffc28b90b
SHA1e169bc583e33aeaba3b241d705c3b6f185ca34e5
SHA256a91da93df4a825e1c0077369f2d4d72dd56a6e56aa0740699c9c6a0e77086766
SHA512fc0be3fcf9a79497047b3fd2fef8211c393a57bd35766fc39bca90783aaeb4a137883564d114743f79679e9ee38733539f266bb467e87f9da33264f475bc2727
-
Filesize
7KB
MD506241eb8951f4a75159ed3a56ca5f278
SHA180b475ecd14612bbc90659ac2a22291b2f9dad03
SHA2569ff7c9a1c4534f5f3d05cb9aa3ecdbdfd469f330ae1d2df94565bb6249651a93
SHA51254c9b214d9f7c5e1a0cca5dd6538265c323fd053fe0ede3a07109b5139aa588f5b945e8aba111b41bfaf5e3d80870915eadf76fcb85564d87c9d22c45b57f131
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD55ffaf833d406ec57b807e350b381a363
SHA1101ac344b04c6d032f3dc9e1d6a706c547103604
SHA256184cdfad4a90a47564688b15f48b9eae7981b1512ed8a9a7006ddc32bb8819e7
SHA5125cc8e8e71bd3f15f1fb6a50d695141a201dda9347c86b9a9e47a3ca9d9d2c42fee618e90b71652dfc09d29c525b05bdb0efeceb509849e60266c14007872ee2c