Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
10/08/2024, 17:07
Static task
static1
Behavioral task
behavioral1
Sample
86ec911d6857bade4b6af56b412c7686_JaffaCakes118.html
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
86ec911d6857bade4b6af56b412c7686_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
86ec911d6857bade4b6af56b412c7686_JaffaCakes118.html
-
Size
195KB
-
MD5
86ec911d6857bade4b6af56b412c7686
-
SHA1
8ef73b2507ecea911c8d060730fc2e551730108f
-
SHA256
212f7112cc52ef436693ba8de7bf4735896310b5be8cefd9184d19d5911a6067
-
SHA512
90dbb8aa37bf2efba804be59d7cbaf99c5a92ffd55d76bcc4c0675203b6c3670ab83a271555a089144f473e433b7655e07a2779aaf327e8d916e74849db482c3
-
SSDEEP
1536:pbMjw2fMk1D3O9Pj2fcggAHAxLDLMA2BRfcZriagOp:sBcHLERfq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1944 msedge.exe 1944 msedge.exe 4888 msedge.exe 4888 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe 3156 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe 4888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4888 wrote to memory of 392 4888 msedge.exe 84 PID 4888 wrote to memory of 392 4888 msedge.exe 84 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 4352 4888 msedge.exe 85 PID 4888 wrote to memory of 1944 4888 msedge.exe 86 PID 4888 wrote to memory of 1944 4888 msedge.exe 86 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87 PID 4888 wrote to memory of 4284 4888 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\86ec911d6857bade4b6af56b412c7686_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff877946f8,0x7fff87794708,0x7fff877947182⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1560818333152653489,12205892111622890694,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:4352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,1560818333152653489,12205892111622890694,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2464 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,1560818333152653489,12205892111622890694,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1560818333152653489,12205892111622890694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1560818333152653489,12205892111622890694,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1560818333152653489,12205892111622890694,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:756
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2812
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5eeaa8087eba2f63f31e599f6a7b46ef4
SHA1f639519deee0766a39cfe258d2ac48e3a9d5ac03
SHA25650fe80c9435f601c30517d10f6a8a0ca6ff8ca2add7584df377371b5a5dbe2d9
SHA512eaabfad92c84f422267615c55a863af12823c5e791bdcb30cabe17f72025e07df7383cf6cf0f08e28aa18a31c2aac5985cf5281a403e22fbcc1fb5e61c49fc3c
-
Filesize
152B
MD5b9569e123772ae290f9bac07e0d31748
SHA15806ed9b301d4178a959b26d7b7ccf2c0abc6741
SHA25620ab88e23fb88186b82047cd0d6dc3cfa23422e4fd2b8f3c8437546a2a842c2b
SHA512cfad8ce716ac815b37e8cc0e30141bfb3ca7f0d4ef101289bddcf6ed3c579bc34d369f2ec2f2dab98707843015633988eb97f1e911728031dd897750b8587795
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5959e244f6628a81098af11e61f9ae5dc
SHA150a18d9b9a2b4c28d57c16a644e96daa2cd1ab16
SHA256980d4270b590ac09236f848002af10552c0baf988a4d8e7c85b06187b9fb8e7f
SHA5120e450d9e6b91a2bedf1819478161c3a556ccc3595114ff5fb8769b66b8722666e074ec81840e7542822d94ded218169c024b1c6e1145ba05b709289090f8b875
-
Filesize
6KB
MD5e9750cf1b04c5837be9e522f5131400c
SHA1115e255b45d87b0bd62d071ad2fb865d02d435ef
SHA256742fb965640121c385e4472e0da868036c3f83274e00b9c1aa20feffaf7dbd84
SHA512c943d5f00c9cbf2a4b56a3cf0d93530ca7705f96430ef7df4a6e5266ba0b43ca4cffc7bca6cd2f9f4420a05a05ee6058017c6e7c83f5d32b3aef22e0c126c73e
-
Filesize
10KB
MD5e8d3b4cb40b36ed0a87827c725b1b39a
SHA16ff3054b44845cce4aed114219fa9bbd3da9898d
SHA256656f507b128e9816879bb250476c20e6b21caa6d739f7bfb79fe0963214c8e2b
SHA512106a6eb03b9f1db8ffcc86489af6596e5bc7e6165fe6706833ab6c26537eb4b555428b330377a37d1d8587309302839f9919fe816fca0c024d6d86af75d2c6b1