Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 20:52
Static task
static1
Behavioral task
behavioral1
Sample
254b6e3a558f8c6c0da7c0c70e4cdcbd_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
254b6e3a558f8c6c0da7c0c70e4cdcbd_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
254b6e3a558f8c6c0da7c0c70e4cdcbd_JaffaCakes118.html
-
Size
1.1MB
-
MD5
254b6e3a558f8c6c0da7c0c70e4cdcbd
-
SHA1
f2a6b098cb7455a2c5c06476866636aebd636ff8
-
SHA256
e12e4aa00eb912f029ddddcc4e63a1c3f997bb6388f36e7ff79e170b5f260e21
-
SHA512
086b60280e5c077a2c068d6325ef689fa5df8bc8de9e283b8efa7a604d09cbf61f97c02afea5e53a5c80a41ecd150f2331359c76cf9bdd82289434752b716c7b
-
SSDEEP
6144:R6azIebi2PxTcFYdGCqxE85W6YTkuMHjMeGppNOrUggUy:RrliUFcFYdGCqxE85W6YTkuMHjUpUM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2040 msedge.exe 2040 msedge.exe 2092 msedge.exe 2092 msedge.exe 4040 identity_helper.exe 4040 identity_helper.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe 3140 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe 2092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 4392 2092 msedge.exe 83 PID 2092 wrote to memory of 4392 2092 msedge.exe 83 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 1832 2092 msedge.exe 84 PID 2092 wrote to memory of 2040 2092 msedge.exe 85 PID 2092 wrote to memory of 2040 2092 msedge.exe 85 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86 PID 2092 wrote to memory of 1824 2092 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\254b6e3a558f8c6c0da7c0c70e4cdcbd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8931146f8,0x7ff893114708,0x7ff8931147182⤵PID:4392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,11534520084772803927,16955960342270542507,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:22⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2204,11534520084772803927,16955960342270542507,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2316 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2204,11534520084772803927,16955960342270542507,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2648 /prefetch:82⤵PID:1824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11534520084772803927,16955960342270542507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11534520084772803927,16955960342270542507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,11534520084772803927,16955960342270542507,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵PID:4440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2204,11534520084772803927,16955960342270542507,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5980 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11534520084772803927,16955960342270542507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:12⤵PID:3108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11534520084772803927,16955960342270542507,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11534520084772803927,16955960342270542507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:3800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2204,11534520084772803927,16955960342270542507,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4912 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2204,11534520084772803927,16955960342270542507,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3140
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2524
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2584
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
189B
MD5cdce8d3583e005f6b2236a0e7f57c71b
SHA1b97b3a26a4cd145ea8138f12b0999920690acb9a
SHA2564db4e7791fe25db96b8376abac1113bfe0b1e1726ecf9f49aee373fc0193c93e
SHA5128770252ccf5f91370111e12e17547973ab84af26cef6da27776f6cdbf9aa5cde8df4be5f194ad31b0d4f1b2d54edd758d9257f67f9a1dd69f4510bbe505b6d53
-
Filesize
6KB
MD595f550f8f302f9a88e8537592a6c0ecb
SHA1ec98fcf7713e2028ba145ad83aac3ece7333020e
SHA25658416732ee6984b3d751086f3ba013380989aae236e289f7e33bc2d1a694c259
SHA512b6f95a38081c323af0b4d3f3e3eda077f36879cf7d0126215971a93e80c89028e5e029f957877822ebe669209144c46d4cb2f03dee8a7c3738fbff776cc29c9b
-
Filesize
6KB
MD5806ff0cd62fa36e5c8e1c692ac41a97c
SHA1eded47fdb0a8b0231a0a184817184b0ba2f15222
SHA256607f2516eccf33a1f215469c774e5f68b7bc8258e9de69e4d93cf2a274c7a379
SHA51205e26c14fe740d411efbfe41ef0bb2357317b0c2262e2091e880f751aed847902cc4df065da2a89d31a31f1cb0e1cc3ad3df1a08e509f0e4111b47c778b229e2
-
Filesize
6KB
MD51eb757c0912c5462ccd30c79c67950d0
SHA10f810ce4d94176d76cad9414cf94586fc332bd48
SHA256fb172324724d24473431b3fdb3c777f482a17f5d4f22431af042f67104ffe03c
SHA5124188172e07aae19baa39933f68ff77140f2d4c8dce4706d0ef41adefa721b9a59a6aa4cf9252ac476a5f0bc18cb7bc36242a85f2a666ff20aa57c8bd212bdf20
-
Filesize
6KB
MD5d65764b0084c8cd18a0ed28c67f6cd93
SHA13606f4ec968c605430728040df422cbbc5888176
SHA256020d560abbc6f851301d9afbaae9d9ef65d991061095209f27bcb14b65b12210
SHA51277f1426e157330c98752faa309a01dacbdc5eb94035a6e108e4f001d87dcefb1fb850bd5211c7310e1885613b56bb124a62730b90b6b6e71c395e4ba2a099501
-
Filesize
204B
MD56b09f18aecd3b0f3a8c20f5369bc6c11
SHA11d097a234ba73cae22a27910adac82de7d7ccf88
SHA2561f651bb73c811870b92a57d7726d7616200e655fd93760b26afb32e9888be2cd
SHA512bdd90fbcf459f6683e22f5bc6afeb403cb750b8453059d304f1b64752e3d1a8c7a128d4e60f05bb598c1291f9b6c1cc278cb97d81a62177536bcbe1a8bc0bab0
-
Filesize
204B
MD5cffa249c461eb483248f5aafed7eafec
SHA143c9f7ce219cbd8a2f1cb322b6b952dcd80bcd45
SHA256938937beb1bf5077b3d397e5847994882fbe9946018b58c75e9651d4ebafdf10
SHA512493810fdd8c04bbc58e75934abc12286298dcbfabc1ac1596dbe6185c3c03a7dc8b32bbfdc37fa7d70c23e7af7227acef05f52a60c3bc1ee83b6a659cbd6453f
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD58712fcab6653e453eb4ee8faa4dc9ade
SHA163f142dd58e0e86b68f402a3b56681dff62d938e
SHA256b099563161ba235e0080ead4f215d6d7177df4e8c2066c43b3e343d6e266bde2
SHA512b441896ab5f390ad7f2d75ebeb4acf85c8c862997e9f91286c865372f278eaebcdb4d863c87b260edc45eac15c1bdce64d298874a1565e959cfab893e115f1b9