Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 23:26
Static task
static1
Behavioral task
behavioral1
Sample
2705facf94ee33f219eb15c72ef8fb5e_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2705facf94ee33f219eb15c72ef8fb5e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2705facf94ee33f219eb15c72ef8fb5e_JaffaCakes118.html
-
Size
139KB
-
MD5
2705facf94ee33f219eb15c72ef8fb5e
-
SHA1
1363bfd0409e94caa7e05fdc1d4d9d172cfe5050
-
SHA256
b9f84301425377d323669f0275080688dc2dc2e926caa674d822af4d86259355
-
SHA512
900ff2dd2fd2c25e559dd11b0da3588e3f4886d25ce52966b9c233f91191fa1e139143d00a4275ebc2217c1239190710371bbcedb3481a675953e46263239f4d
-
SSDEEP
1536:S6svj9Ruma5wqE6JmFx3l0yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09M:S6s3iyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1948 msedge.exe 1948 msedge.exe 1804 msedge.exe 1804 msedge.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe 4300 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe 1804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 796 1804 msedge.exe 83 PID 1804 wrote to memory of 796 1804 msedge.exe 83 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 3980 1804 msedge.exe 84 PID 1804 wrote to memory of 1948 1804 msedge.exe 85 PID 1804 wrote to memory of 1948 1804 msedge.exe 85 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86 PID 1804 wrote to memory of 2724 1804 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2705facf94ee33f219eb15c72ef8fb5e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5e5b46f8,0x7ffd5e5b4708,0x7ffd5e5b47182⤵PID:796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11910553368384074199,10508606750380550361,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,11910553368384074199,10508606750380550361,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,11910553368384074199,10508606750380550361,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2928 /prefetch:82⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11910553368384074199,10508606750380550361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,11910553368384074199,10508606750380550361,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,11910553368384074199,10508606750380550361,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1744 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4300
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3836
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
478B
MD570a67fe278a99cce4cd4f0b0db9aa85c
SHA1af432fd582913d718f9d79b616b77f4804d5c094
SHA2568d2be0477a793f180bc9674a9d54b0473ccf231ca945a4d4bb2d342151ad7e18
SHA5127b89c3a3fa87b8c33c895a6c71c22edc267525d1bd4efe4193971bc1f9d669468fd1ab79db172abd37f6a1a151a1b7579a8061251ee904d7ce61a603becb19b4
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5101105830d9863c0350c06ab5287e107
SHA12eb1c651ec7e8425e5afc34df565799de6f942b9
SHA25618ab32162b607518f1fd9d4ae6c1aa53835175d6a47a19b70e046068d87cef33
SHA5123c7ff4556625948a51c9466ac24040cea82daee7f9fa964fb3eebdea1b5e257b81f5ea41ec66fc51d113d8b2f7416a804008dd3b9d57f230c496ab992fa53936
-
Filesize
6KB
MD5c88f7bae64e57f97439cf34f6c631fa7
SHA17e3fff8596362df5f42a434d5277b228a4f3aa38
SHA2561b178c779ef0c59ed54bf6a568cb4aa82229f8955ea7f0c749fe848cad9793bd
SHA51234b9254dedd0e3d8736d8ff3f0b0895354346b1def61d380fb1ae1943f226977d597ca198c074576c1391886e2e7633096c1806e8250f45a3d45b661987e274c
-
Filesize
10KB
MD5e244594aea898008b4addec15c86647e
SHA1a2286097ca26ee910c1f948936da45c1b6fc2752
SHA256987a91790d34d4944c68b94e4715ee2905c4c7b2a682e2c03a29fee3e043b5b7
SHA51268a3beb962c9df4c0cba9c89cb552d2aea07a3e09d50086c2a9de5e29681ea2b7eb9d5a4d2ac9de6e07134bfb630654dd287443b08cfea9cb8ecd78567ef760f