Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 21:01
Static task
static1
Behavioral task
behavioral1
Sample
2566fe6294cb069548f2c72cedb0fc42_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2566fe6294cb069548f2c72cedb0fc42_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2566fe6294cb069548f2c72cedb0fc42_JaffaCakes118.html
-
Size
141KB
-
MD5
2566fe6294cb069548f2c72cedb0fc42
-
SHA1
6e86d3e3b77221f7a6495b5c2e25b07588e3b65e
-
SHA256
3b57c4394cdfa7128e42b5fdc2c51ac226ca43564d5ac912677cde3e340b96bf
-
SHA512
3ee942bb16f6fee986561558591688c196ebaa0a6841f7baa454af0eed18d34cd9f4148e4981f73ded2f14429f41bab1185943673adf73eadfaec7b55612fbd2
-
SSDEEP
1536:SYek2KSuP6/whPx76vuyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:SkSb6x7dyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2592 msedge.exe 2592 msedge.exe 4832 msedge.exe 4832 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe 3268 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe 4832 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4832 wrote to memory of 3732 4832 msedge.exe 85 PID 4832 wrote to memory of 3732 4832 msedge.exe 85 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2604 4832 msedge.exe 86 PID 4832 wrote to memory of 2592 4832 msedge.exe 87 PID 4832 wrote to memory of 2592 4832 msedge.exe 87 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88 PID 4832 wrote to memory of 4156 4832 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2566fe6294cb069548f2c72cedb0fc42_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaa9a046f8,0x7ffaa9a04708,0x7ffaa9a047182⤵PID:3732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,16227602893872656664,379466009176298832,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵PID:2604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,16227602893872656664,379466009176298832,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2432 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,16227602893872656664,379466009176298832,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3000 /prefetch:82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16227602893872656664,379466009176298832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3052 /prefetch:12⤵PID:1644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,16227602893872656664,379466009176298832,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3076 /prefetch:12⤵PID:3844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,16227602893872656664,379466009176298832,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3268
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3860
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
6KB
MD56eea3b7c7d89976f79f98d9ab2787319
SHA1587d5e6a7e67d313ec9ceb8b6f786c657a23ef31
SHA256c83284d204253b4c27d54244eb3aad796569483fdabba58aa07dfd8d0b763965
SHA5120f129acecc90230358697c140fe734cafda10cb4c31836af1770d5681fa1b678a470aaa2e1c0f655bb42e0e634d3fb1c9caadf941e6654b3ea159044e2b4f8bb
-
Filesize
6KB
MD532cda1def8a10e324b95eb8a2dcabbe1
SHA1eb4d923ec792cd02ee1de3dbb047c4e04ff70077
SHA256c272f1b60bb3e72df6a6bd3d47885dde988e91d9d0e7b5f6f94ce9a93ce2e87e
SHA5127fa939d00887035783d6a3c47debb07baefe0ff6e236b322eb1dc9af0b1c504e5cfcbf764ca9bcb504cd0a2c7f4aa1210f2a34e10d84416da920a999f4e421ba
-
Filesize
10KB
MD5f33e9bf5974ea398c337afd0c6e1b722
SHA1129e5f659bee98c7260dd60121b645c622fac99d
SHA2563a86ebc0d2f31176d1a6096bcdd187618a050cf4d63dbe2b57a5340cc9777cad
SHA512e4755be352ce4b4ae9d6a814046036ce01be8348d710a350a50c0f7e0c17549caa094c21a4814d8b343f3adec669c728c82a32b780d1dbe2a939d2f8090ec1bd