Analysis
-
max time kernel
140s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 17:10
Static task
static1
Behavioral task
behavioral1
Sample
0269046fe512141ab929be7d90bcdc9c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0269046fe512141ab929be7d90bcdc9c_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
0269046fe512141ab929be7d90bcdc9c_JaffaCakes118.html
-
Size
11KB
-
MD5
0269046fe512141ab929be7d90bcdc9c
-
SHA1
4cdba4c81f186e5730bc96d6a35bee2995ea1d61
-
SHA256
49aaf6ccea2f45d0270c651d03aafea225d9f684934e920daf0e12c427cd25bf
-
SHA512
51759e0e2f980b98f8887d23a9401e96350463905ecfd4eb8b07ce502340e4416889783c697935e4dcd1ba141956e9d0777a9a159650b9577cbc45778b263647
-
SSDEEP
192:XO5fuyBVgdjtAjA3HdodlJE7eZPZ+PBBXul2hB2+HR1Zhq9jQ7SSnDC6TC:jICdjtQo9KlJE74Z+PBBXuYBLHR146TC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry msedge.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133721899211850848" msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2170637797-568393320-3232933035-1000\{A710FE58-579C-4718-B4C4-047012F83644} msedge.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 704 wrote to memory of 1040 704 msedge.exe 105 PID 704 wrote to memory of 1040 704 msedge.exe 105 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 4412 704 msedge.exe 106 PID 704 wrote to memory of 3108 704 msedge.exe 108 PID 704 wrote to memory of 3108 704 msedge.exe 108 PID 704 wrote to memory of 116 704 msedge.exe 109 PID 704 wrote to memory of 116 704 msedge.exe 109 PID 704 wrote to memory of 116 704 msedge.exe 109 PID 704 wrote to memory of 116 704 msedge.exe 109 PID 704 wrote to memory of 116 704 msedge.exe 109 PID 704 wrote to memory of 116 704 msedge.exe 109 PID 704 wrote to memory of 116 704 msedge.exe 109 PID 704 wrote to memory of 116 704 msedge.exe 109 PID 704 wrote to memory of 116 704 msedge.exe 109
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\0269046fe512141ab929be7d90bcdc9c_JaffaCakes118.html1⤵PID:2020
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=16 --field-trial-handle=4960,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=4252 /prefetch:11⤵PID:184
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=15 --field-trial-handle=4884,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=4860 /prefetch:11⤵PID:1424
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=5432,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=5472 /prefetch:81⤵PID:5088
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --field-trial-handle=5464,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=5532 /prefetch:81⤵PID:4204
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --field-trial-handle=5896,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=5884 /prefetch:11⤵PID:2236
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --field-trial-handle=5780,i,1330210614411927383,9239043499051775691,262144 --variations-seed-version --mojo-platform-channel-handle=5632 /prefetch:81⤵PID:3944
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window1⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=127.0.6533.89 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=127.0.2651.86 --initial-client-data=0x238,0x23c,0x240,0x234,0x264,0x7ffcb387d198,0x7ffcb387d1a4,0x7ffcb387d1b02⤵PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2312,i,2484040778208231900,18387235042147343694,262144 --variations-seed-version --mojo-platform-channel-handle=2308 /prefetch:22⤵PID:4412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --field-trial-handle=1928,i,2484040778208231900,18387235042147343694,262144 --variations-seed-version --mojo-platform-channel-handle=2344 /prefetch:32⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --field-trial-handle=2352,i,2484040778208231900,18387235042147343694,262144 --variations-seed-version --mojo-platform-channel-handle=3548 /prefetch:82⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4500,i,2484040778208231900,18387235042147343694,262144 --variations-seed-version --mojo-platform-channel-handle=4528 /prefetch:82⤵PID:780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4500,i,2484040778208231900,18387235042147343694,262144 --variations-seed-version --mojo-platform-channel-handle=4528 /prefetch:82⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4020,i,2484040778208231900,18387235042147343694,262144 --variations-seed-version --mojo-platform-channel-handle=4732 /prefetch:82⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --video-capture-use-gpu-memory-buffer --field-trial-handle=4524,i,2484040778208231900,18387235042147343694,262144 --variations-seed-version --mojo-platform-channel-handle=4808 /prefetch:82⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --video-capture-use-gpu-memory-buffer --field-trial-handle=3320,i,2484040778208231900,18387235042147343694,262144 --variations-seed-version --mojo-platform-channel-handle=4408 /prefetch:82⤵PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\127.0.2651.86\elevation_service.exe"1⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
40B
MD520d4b8fa017a12a108c87f540836e250
SHA11ac617fac131262b6d3ce1f52f5907e31d5f6f00
SHA2566028bd681dbf11a0a58dde8a0cd884115c04caa59d080ba51bde1b086ce0079d
SHA512507b2b8a8a168ff8f2bdafa5d9d341c44501a5f17d9f63f3d43bd586bc9e8ae33221887869fa86f845b7d067cb7d2a7009efd71dda36e03a40a74fee04b86856
-
Filesize
11KB
MD5afb9528c34f8e701a4a899b42dc4e632
SHA10392dd624093a87674249ec006d2e7f166943a26
SHA2568491e16154fbfc8bb4825e64e50bfae13afe3732f71e312d378e56ee2c422349
SHA5123f36886bd339d5ed780ab9f4f469e7cd618c5ed455f55c1ff51ec029006e096499e54f346f166165468840541fa89811c29db3ae3089a19c48ab3932f88e43e6
-
Filesize
30KB
MD5fc764ad28ceb75bac8107e90b6cd132a
SHA1119cc13363b2eafd0994bfec4d4dbb2c46dfeeb3
SHA2566360227ad9f93d1d9eb8d8524b6cb342a69621a92864163c72003f4e503fef91
SHA512b45e21cf8b0178fe171321ffbe8e6322ada11639ae51f2d1beae8a77889951cb1756abf8a73c57df1825ab340459bcf778c3ae370b97820951868c84e891e8a9
-
Filesize
51KB
MD5ed2f2ea94cd4c89eee8142ef10d04743
SHA110790ca833a09b1a48314f418d7c807b61e56bef
SHA256e84c050177fd831d1d1ec4074b84358104deaca87a28b5630e25599e3c6ba941
SHA512d256f72252457d6fb2fd9a1ad05d4fcf378ccf832615a3235ad1eeba8c85c46a27a382d92f63851776ae9d2528e1aaeb0dafe10291034339bd5aabc613a46457
-
Filesize
55KB
MD59f43b7e77aae605670d73b1389bf48cc
SHA1704766e408f9322b1a3259f3c1e6083e11b6d9b2
SHA256a3e23b03b6af1a335f7f68ec2181a4e1a62422971722fe22591244200ab22f8f
SHA512318769fdcba4154a882b569531d926ffbe9ddecd7b2636df25334355be6c6ebd5a245efec4d52fc6d338cc0c5bbb4a496c8ac85b10324f99df9aadff907c1b6f
-
Filesize
51KB
MD56f8966ba3bc1c3f5048e38bedad8ae68
SHA11fed82c2193a784d5dd865546f66073bf7387b4a
SHA2563221d6b0af2463b80d16757c9d4cafbfee7a1f839417eb60e964b4cdeceecb99
SHA512a26d63b70d52dad399f4907410685d6db2e84cd0a387c2723bba613ad51cfebed381d7378cccc55dc98a7fb95cdb4cd21500dda078af68d4bb7a5aa3d4cfeacb
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\5a2a7058cf8d1e56c20e6b19a7c48eb2386d141b.tbres
Filesize2KB
MD5a995d69b05befbdd56cb01d1670b20dc
SHA11b298d9311b72e9bcbd8501322b798c95278bfef
SHA256f52c823880795928e3706a72f310470e547f854f8d2af8dfbbfb9bc395de6f6b
SHA5128ac0d9a6cb08e3e108fab4a7b4550c250d1c60758ba02885a5605e6965714557a7356b3e26bee2f82e0af2cb57f60b1f4028a3c2cac7f07c26f7bd7f8753bda0