Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 22:41
Static task
static1
Behavioral task
behavioral1
Sample
268cd0031193d84f649260426963def1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
268cd0031193d84f649260426963def1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
268cd0031193d84f649260426963def1_JaffaCakes118.html
-
Size
214KB
-
MD5
268cd0031193d84f649260426963def1
-
SHA1
04531d25dc6215718abb2950079979fa0265d415
-
SHA256
1cb1363d7623cbe63103a1beeb145068212a5f828444a315c7d1d37c3e19bf4c
-
SHA512
3cf90392ed7ee98d4a9094eef5d15f8ae5da1bf27972d68937430771679dfe105e90afd95783bffb55fa4e7f0ca62a141f0f85fa4dcb9e243a1644e701cb643b
-
SSDEEP
3072:rrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJu:fz9VxLY7iAVLTBQJlu
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4260 msedge.exe 4260 msedge.exe 4040 msedge.exe 4040 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe 4040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4040 wrote to memory of 1812 4040 msedge.exe 85 PID 4040 wrote to memory of 1812 4040 msedge.exe 85 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 3764 4040 msedge.exe 86 PID 4040 wrote to memory of 4260 4040 msedge.exe 87 PID 4040 wrote to memory of 4260 4040 msedge.exe 87 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88 PID 4040 wrote to memory of 4504 4040 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\268cd0031193d84f649260426963def1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcc5c646f8,0x7ffcc5c64708,0x7ffcc5c647182⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6522170381613620293,8052176510125091477,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,6522170381613620293,8052176510125091477,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,6522170381613620293,8052176510125091477,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2608 /prefetch:82⤵PID:4504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6522170381613620293,8052176510125091477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,6522170381613620293,8052176510125091477,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,6522170381613620293,8052176510125091477,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2220 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3308
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4084
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4512
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
6KB
MD57ba57eb7968c8fec3326eb9408d6a63d
SHA18efd8e9c026c6f3fd23611c052e4b45a4c89c59e
SHA256407097aac309247c81e9d3002516c4ec4a1002adc5c534b6174a38d3ba284dab
SHA512faeccfb0f4a29cd5dab97ca611c6719aca1ad012b0f812070bb1c8a417923176160587c2cdcd92b40ed85924e02f6f0c1d9b423e83216cd9ea2d8a4e2635b59e
-
Filesize
6KB
MD5f5493332ea40f1b4b11a7f9d06bc7031
SHA16919f60f3cbfadb4336e6380f46841d0a4d0640e
SHA256f483f82dd5652a45799709110978aa39f8d2aec0ee0f930c1a2fbdd5362f2fc6
SHA5127be7464bbf4e2952cb016d4d27903344e8fccd75daa74ee228233005fb2d620d5a3cfc2ac688727c2faa35af96d9d9e1332ab922a74a85f68f048e30e00471ca
-
Filesize
10KB
MD55dec0e3c3842cc70cc21748c75d9f638
SHA1ccaac03cf8fad2eff0a241a7a38d5137497e26d7
SHA25688781827a1652e41ba23789c8e3d7b2363aecde3a3884bb70b1b0bcfce6ac424
SHA51252bd800088d890b7b29afd543be50eb28d63677f4ede6de7d6dcb230d5694003d18bc7187bb4b80faf993ebaaa899fdd63a6ff0ea721009e4eeaf010c1f2102d