Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 04:18
Static task
static1
Behavioral task
behavioral1
Sample
f52a28508f9cfa9a103a034ba2b78c41_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f52a28508f9cfa9a103a034ba2b78c41_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f52a28508f9cfa9a103a034ba2b78c41_JaffaCakes118.html
-
Size
4KB
-
MD5
f52a28508f9cfa9a103a034ba2b78c41
-
SHA1
5089e403c38e6fb67c42afc3c96f960dbaa560e5
-
SHA256
df5c828c28a0904d07cd0a654625efbe39232a75d415bebf6ed6a3dfb2c86198
-
SHA512
32c2acd628fad28f9868756e4de97ff4e891478bba82a5b1e62e37212d827e417444d6225dbde8a6d60663873e21828b7b9cfa8719868a8959c83dfa776558a1
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8o+w74CW7:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDn
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 428 msedge.exe 428 msedge.exe 3436 msedge.exe 3436 msedge.exe 64 identity_helper.exe 64 identity_helper.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe 3596 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe 3436 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3436 wrote to memory of 4056 3436 msedge.exe 84 PID 3436 wrote to memory of 4056 3436 msedge.exe 84 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 2556 3436 msedge.exe 85 PID 3436 wrote to memory of 428 3436 msedge.exe 86 PID 3436 wrote to memory of 428 3436 msedge.exe 86 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87 PID 3436 wrote to memory of 2412 3436 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f52a28508f9cfa9a103a034ba2b78c41_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbb95f46f8,0x7ffbb95f4708,0x7ffbb95f47182⤵PID:4056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,18273876602532491476,423861866789527192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,18273876602532491476,423861866789527192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,18273876602532491476,423861866789527192,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:82⤵PID:2412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18273876602532491476,423861866789527192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18273876602532491476,423861866789527192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:4684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,18273876602532491476,423861866789527192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,18273876602532491476,423861866789527192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4916 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:64
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18273876602532491476,423861866789527192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18273876602532491476,423861866789527192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18273876602532491476,423861866789527192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5472 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,18273876602532491476,423861866789527192,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4672 /prefetch:12⤵PID:4808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,18273876602532491476,423861866789527192,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1052 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
292B
MD5b80a8160a4c1e8baa9541797cbde7013
SHA1fda7ab6cdb3f0bd4a9dd1642cb64ddd78a266426
SHA256bcb6f087a13f347621b65f848d80eb26f5f507e94e0d21d4f30ea6bf5b4d9d1f
SHA512f07fbc6cb6b5a60d70c698862cfff53a00b0f734e5298bea50d7eb13042354f0c6c6b34b7f6fe84db43bfbad1b8149f203fddba20ff73a247f0ab01328b4a35f
-
Filesize
6KB
MD5f3ebe23585d7b0ca4336469713284a6e
SHA154a3b3bbea7d8d14207d1dc4ef405e4f72b32064
SHA2565facddc4d2442dba7db13cc676d5adb81f1d2821c5cf6d8138d41947c5650a59
SHA512b270ece3b5a91d03a3eeefb1ba3fc0e6e4fb824248f7c8c55dbb39221340c01fbcc883816cb89c02499b05e1b06adc8254cb661fd4083283b828cf70c223efd2
-
Filesize
6KB
MD591ad51870ffac23be0fec79445004ed5
SHA137f5545cc31ffbf93f2d4f1fdc7561f6991e2fc9
SHA2566f8a8948746c845524e81f0797f6eb0f5c4649bfcc8a1b2427ad931e50856c89
SHA512c9a119df08f805b1f567d76f2803b913abef241e30f7029a3a3b383c797196f9f099b40815ce68eb6bb2c83fd1681e7ba709fdc3e96f72b317c38e4545847893
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59aa51641793dc46bdd4e57a8131a1203
SHA1d3873d5e4d5b52f2c0b5db7b1a85c4cb2edcf996
SHA2560a14d65a839a602e2e3c67dedbad8b4ba2088aedc278c90e5796a0e7ff2d4cc7
SHA5125efb7ee4ba6ac25ce951b50f03e11ccf8e0c94a8523b4c2829aa1f2cad1c36f0027db51e06cac8f1804ee3696ea4b3c2561ec5a52537906aa252d295cba180c4