Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 20:28
Static task
static1
Behavioral task
behavioral1
Sample
032543cfb5093eb53377acb42b0b7aea_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
032543cfb5093eb53377acb42b0b7aea_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
032543cfb5093eb53377acb42b0b7aea_JaffaCakes118.html
-
Size
9KB
-
MD5
032543cfb5093eb53377acb42b0b7aea
-
SHA1
a82f953737f0867d75d761da6ca6e29f415375d3
-
SHA256
e920fb55de95d7d2c15a57fb3a213f97ff82342785a02e89b1e6009b96b27338
-
SHA512
adcf61b7370290236ef68b657908a092f06528e40dbd7991f148821eec05be448d014052b862e18f5452aa3bbaec7a5368dee96dbf77a3598e4fae19cb9fbace
-
SSDEEP
96:QOh4SCFrjBVVvqddTdd0ddLe5/tSQDfV9UaLjiHYUCHWUCHSUCHr6UsRGGG/1z81:hxC1jDVtG3LXhPsZ5ARUp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4480 msedge.exe 4480 msedge.exe 2472 msedge.exe 2472 msedge.exe 1400 identity_helper.exe 1400 identity_helper.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe 2604 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe 2472 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2472 wrote to memory of 1848 2472 msedge.exe 82 PID 2472 wrote to memory of 1848 2472 msedge.exe 82 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 3660 2472 msedge.exe 83 PID 2472 wrote to memory of 4480 2472 msedge.exe 84 PID 2472 wrote to memory of 4480 2472 msedge.exe 84 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85 PID 2472 wrote to memory of 3664 2472 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\032543cfb5093eb53377acb42b0b7aea_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3f7f46f8,0x7ffa3f7f4708,0x7ffa3f7f47182⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,814810802368114106,9261100843954732047,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,814810802368114106,9261100843954732047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,814810802368114106,9261100843954732047,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2524 /prefetch:82⤵PID:3664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,814810802368114106,9261100843954732047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,814810802368114106,9261100843954732047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,814810802368114106,9261100843954732047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵PID:2668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,814810802368114106,9261100843954732047,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6068 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,814810802368114106,9261100843954732047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5240 /prefetch:12⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,814810802368114106,9261100843954732047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,814810802368114106,9261100843954732047,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5060 /prefetch:12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,814810802368114106,9261100843954732047,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,814810802368114106,9261100843954732047,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
5KB
MD5e664d34dc92a2515f550a45b9ca946d6
SHA1169de809a1268943f5f53973c46db42f6ac2a3be
SHA256c48961197a07a08219c8ac54e4438214e735ff297d17661fa4400f9ede7f6e4d
SHA512f16521cb8ea6e3692037915ba3e3b6451848102b018ea0f721e8ec1a84e79a4085717e877d70c7674c2c37890aa04cde0fca39591173ed866047651f12e54652
-
Filesize
6KB
MD59315cdc4693f2d811c0f37edbf385c95
SHA16f7d32942e91a1f70cca830565c1724b42979286
SHA25651cccc49f8e51d56145bdc42f43dcadb3c89b290dad40172432151895a8b12e4
SHA512e2a13bf5f55e38f2c968e067c496f85644d1a42028de51ad76169808bd43c75ef0c73d6635df2810053fae1dc366535335ee4b5d670924377441730a2f582079
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51a22ed11fce20114ad9c75fa4125f862
SHA1df7fe6b75b1b776e97596f02adf39cabcaab6e42
SHA25629c588c182e23ba7e62d2c3fbf6828157455d81b26cbe6b564d1e06b6d73d300
SHA5126966b246c4655da0616ea9c9f875441a6f9c0d80a6553113bb11f1e4df414970b9bcc4c235a59d8f3c59f39c0e451197f94c3e5e7840f59915fe5e18d050ccf1