Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
252c1d2468d82eecda281503ae2f305d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
252c1d2468d82eecda281503ae2f305d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
252c1d2468d82eecda281503ae2f305d_JaffaCakes118.html
-
Size
18KB
-
MD5
252c1d2468d82eecda281503ae2f305d
-
SHA1
88902ea76c1149a3b813d59c2088f4956549759f
-
SHA256
43f7310a06030db4d52c99dd8038eec0274501ede257c9e41780886e20526d6a
-
SHA512
15b8484ca66491db1209d02d3d4f42f9ca302f704ec5b4ec4ed886cc3f5cd7a84bd86197f8d7abfa43867e26f50440a238ce18d05b83560be601ea45295c8003
-
SSDEEP
384:rF3GeGVFTm4OosiFg4D4jdRqR/F7D+vzJqwruquDiTMVPvHSblMNv6uPIjkeetyT:rF+FTm4OosiFfD4jdRqR/F7DgzJqwruC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 4432 msedge.exe 4432 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe 1936 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe 4432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4704 4432 msedge.exe 83 PID 4432 wrote to memory of 4704 4432 msedge.exe 83 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 4852 4432 msedge.exe 85 PID 4432 wrote to memory of 3136 4432 msedge.exe 86 PID 4432 wrote to memory of 3136 4432 msedge.exe 86 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87 PID 4432 wrote to memory of 2076 4432 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\252c1d2468d82eecda281503ae2f305d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa5f3f46f8,0x7ffa5f3f4708,0x7ffa5f3f47182⤵PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4757314541252540325,7708373432482585483,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,4757314541252540325,7708373432482585483,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,4757314541252540325,7708373432482585483,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2656 /prefetch:82⤵PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4757314541252540325,7708373432482585483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4757314541252540325,7708373432482585483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4757314541252540325,7708373432482585483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4552 /prefetch:12⤵PID:4336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,4757314541252540325,7708373432482585483,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4600 /prefetch:12⤵PID:392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,4757314541252540325,7708373432482585483,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1364 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1936
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3584
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
470B
MD5d8de313ac159d4ddb690d1636abd817f
SHA121e73722dea0e61ccdacf3d251111a04d6d241cd
SHA25677c584e6b2f2c72dacc1517dae8afc8a473f4f31178713ce355d9716993c71aa
SHA5122887f99c2fc38a4efef1d4e12346aad545fc0bd0ee8406f3e18448af303b243c4b00abb86833618ac3d4f23ad93b757849f80028d6d4734a4cff7037b664638d
-
Filesize
6KB
MD5e6c573237411bc32dabd3b8337a7c35b
SHA1390982630032e4a65bf307b33c4d033f74e30aac
SHA256c557a9002a554cbc1f1022e086589da397565017fd9ac7cbb21104fc09257914
SHA512ae68c88f4b1b45521e835e506cf4f47a650402099f589c624c3690a2860010bb2295a70376e84274db6bd188c5848ed649cb326505b948169b5eb34c4009c353
-
Filesize
6KB
MD578b071fd7f4811ef565de99963cc93d5
SHA1f8745458fbbcb498f5df5fef2ff9c6614ad11001
SHA2569a52903156bfc9cd1fd361e028a6b48182f2996f25bcd9a1e79f10d01ce96426
SHA51270bff0d26788c7408a37382cdd7976d1a7c93e9c972254f4066aefa70a0df95f76d227a29f9ae6bd5834d7bd47b62cf7650ee033a20a99c8021e82de0f0e8a57
-
Filesize
10KB
MD525be23bf84d3cf477a2a71046ab16bc4
SHA1098d1e64dedc4434cca631c5faf450cf14ea3ec1
SHA256c23a2f2c6f9945204dd05b76e66dc49ac5d4c0b01dbe03cf199952eaef00b3ca
SHA5128f6a356dde74a61cd8f802ac597493bd372ce6a3400ff3be54f46e698dd778f36ea34b1d0b1dcd41c87836d95d912e1348ddddb0d711729ed3da95b250079c32