Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
25034d957d2b0857586782160690072f_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25034d957d2b0857586782160690072f_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
25034d957d2b0857586782160690072f_JaffaCakes118.html
-
Size
28KB
-
MD5
25034d957d2b0857586782160690072f
-
SHA1
dca87979152939c6fa6b40dc81c72a5be92d3fb4
-
SHA256
824860605078fbecfeeb7b71c7a2cbab609eb7390abdcdab4498b3c493f30818
-
SHA512
b7f2ff3af8fe1c26e9364c8c863121b1a0cab874de5db1165fe3bb1f04f79de4b93aead813fa2e3dcd955ff8754ee6ea75e7bf84a1f72bf735fa4e2f89d5ea22
-
SSDEEP
768:kNjPu39MOCEC6CvCMCXCXC9CXCvM4Xt7/Y4aQJ:ojPu32O1n2T66wYcM4XJ/Y4aQJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2984 msedge.exe 2984 msedge.exe 2932 msedge.exe 2932 msedge.exe 624 identity_helper.exe 624 identity_helper.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe 1960 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe 2932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2932 wrote to memory of 4760 2932 msedge.exe 83 PID 2932 wrote to memory of 4760 2932 msedge.exe 83 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 60 2932 msedge.exe 84 PID 2932 wrote to memory of 2984 2932 msedge.exe 85 PID 2932 wrote to memory of 2984 2932 msedge.exe 85 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86 PID 2932 wrote to memory of 3308 2932 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\25034d957d2b0857586782160690072f_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff4cd146f8,0x7fff4cd14708,0x7fff4cd147182⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,17429339513810830569,8594480525381083867,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,17429339513810830569,8594480525381083867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,17429339513810830569,8594480525381083867,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:3308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17429339513810830569,8594480525381083867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17429339513810830569,8594480525381083867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,17429339513810830569,8594480525381083867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2152,17429339513810830569,8594480525381083867,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17429339513810830569,8594480525381083867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17429339513810830569,8594480525381083867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4996 /prefetch:12⤵PID:4876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17429339513810830569,8594480525381083867,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4956 /prefetch:12⤵PID:4232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,17429339513810830569,8594480525381083867,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3728 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,17429339513810830569,8594480525381083867,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2424
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4424
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD5e9b9a198d36ed5bc6165f16d01f60c37
SHA1d4281c95088be816c69a05506270a672fce096c7
SHA256377eedbcd0819eb050f8d8904a43ae0be5841d5272a5f6d27a3edf3e223dd95d
SHA5120f024e62147db0332b9a38e005ac38d014de2ab49f7b7379ce5b70967724ef776000633c8bb0e81a0f5272fe5459ffe26a3f3a2ab063ddfa51782f634e9da339
-
Filesize
6KB
MD5ab10b862f23585963c89bd3c5c42c33c
SHA11ad86acc726c3ea44a13ad12b4ca72b736f99923
SHA2561d5142fbb4216bbf244dc1289fa3eb392ca69a64e9bd7e4fa1b4fe091a729500
SHA512b6005f39f98998da5e4dfb827d28ebd30a66da980e2a83f08a6b3e31948529057fe8ff4312d4296661c1ddb64b1e750ab403c0d1521461bad627858db897d7ce
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56523f18d0c608800df1c31559e2b8af3
SHA1ca0e978297ee34f223708275af925f7cdbde11e5
SHA256bc9e6c1aefd5f6aaac5950034a2de03316c25bf1d83d7e228b56ac735b813c2e
SHA5126d011aea82b3144c239658fab80fdb3a2ecd21c67b80138f826b48aaf885332dde3048197986dcfd0413a7cc2bfb52e831644132fc0efdfb426e5ada5e718d4b