Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
266bba45a4ae011dda32ceaf3b12034c_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
266bba45a4ae011dda32ceaf3b12034c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
266bba45a4ae011dda32ceaf3b12034c_JaffaCakes118.html
-
Size
46KB
-
MD5
266bba45a4ae011dda32ceaf3b12034c
-
SHA1
88a349afa583322fc69ec1570639900f645e7fa3
-
SHA256
a3e61f6fb9a1c6d836077ae44c76fe6def4a462b9f27dea340e5a474c1b883fc
-
SHA512
50fc8a95a19e8d90a5a2bd5e0fb17f0e5401e4dbad80a9213b5f533a7f625e0f81675ed6e3953695872265b7ae8135cfb24adf2d8da70f05dd1602a03a3afac3
-
SSDEEP
768:S1swMC5yocGZUtIbkbhNafbufRlpU+vPIAorEzTeqiCChGFFbs2Ychp/jaTuI4ph:S1FMCM6etIbkbhNafbufRlpU+vPIAor4
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3260 msedge.exe 3260 msedge.exe 2900 msedge.exe 2900 msedge.exe 4972 identity_helper.exe 4972 identity_helper.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe 4964 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe 2900 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2900 wrote to memory of 976 2900 msedge.exe 83 PID 2900 wrote to memory of 976 2900 msedge.exe 83 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 2804 2900 msedge.exe 84 PID 2900 wrote to memory of 3260 2900 msedge.exe 85 PID 2900 wrote to memory of 3260 2900 msedge.exe 85 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86 PID 2900 wrote to memory of 2380 2900 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\266bba45a4ae011dda32ceaf3b12034c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcad9f46f8,0x7ffcad9f4708,0x7ffcad9f47182⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3180 /prefetch:12⤵PID:1460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4108 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:2932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4092 /prefetch:12⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,4898682474058866725,7722157214276992880,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4964
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1796
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
180B
MD57668e2054d3a44e205c37c776ab4cdf4
SHA110dc70254f5b45d51fb7569fd2f3d3728d4a6a2f
SHA256decce74f47817ed3ddc88e333fd0a877917a1e6aa9916ec327d3583b9b7891e7
SHA5120d59401c8cdd8e62eb951c64b7f069e6f5c20e043bfd3cf2f2ed8eb997ded592d7ae2718fcbc2a5e44966276705c639ef2cf55bbb394e3a2a1ef629bd5126484
-
Filesize
6KB
MD5481932e463b6ac1c1e7e63d467e96d18
SHA1064849210750456299ad46219b9cf8212c0f7522
SHA2565d1861e14fbb66854657dd033c732133c3de3683b038e654cb2ae9f6258b6269
SHA5120cd9db0d9a412ffb2347bceb66dd6862b1bf569f70d721ced4326bf9edb0d58da14538dc2d5852b1b943019f737c8a38888391034903cafb4f7b0a29d728a1ec
-
Filesize
6KB
MD58a9c0461ae16f01a211096bd72ba74b9
SHA173236e63ca751bb28632ba05c981acdff360b0d5
SHA256f5fffed4f90d294cfb63c6b791f3592ef85242c78cd9ff54787a0adcfa043e30
SHA512b7bce7d029a1e4999143023f0731d23857da868f3c47f20abf8c473b9a695c3c4c10bc2d929412f402424be8fe0b3115f8f92540f65f8e7ed4376719cacfdb15
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD556c16cbb1474ee4e15d5b8aa00198151
SHA187627cf9d3049be557c07da61ae8938f95e44ab1
SHA25617409c21e4a9bf865ac8e270fcdd129d3768cdf21ae413ca8fcf84e9abd5dd83
SHA5126007a33a040732de0dc53ece450baf4553cb3fc3b082b4c0a2b02e4fef08cfa0e36dabee793859a32deb650abc89bf6a8a88d8744d36360b0b0e79156edf7413