Analysis
-
max time kernel
148s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
28898868ced03fec43305608aca32bdb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
28898868ced03fec43305608aca32bdb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
28898868ced03fec43305608aca32bdb_JaffaCakes118.html
-
Size
6KB
-
MD5
28898868ced03fec43305608aca32bdb
-
SHA1
31189b451092dd59f8b13428163967daf2c10f7c
-
SHA256
795c07dc1c97928cc870e2ee95868327fb544a135ec69c4fc7ad1b5d676ee108
-
SHA512
a302af29a856b4ba54a68a9f8709a74cabf654b8b141f31496f00099448d28bf4a26e55bcea54b2e153c5ed8f8d1b1516178fbd69396d14c8d35ef304df1e400
-
SSDEEP
96:uzVs+ux7UjVLLY1k9o84d12ef7CSTUij/6/NcEZ7ru7f:csz7UjVAYS/T4Nb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1816 msedge.exe 1816 msedge.exe 3220 msedge.exe 3220 msedge.exe 4464 identity_helper.exe 4464 identity_helper.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe 1568 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3220 wrote to memory of 1992 3220 msedge.exe 83 PID 3220 wrote to memory of 1992 3220 msedge.exe 83 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 4456 3220 msedge.exe 85 PID 3220 wrote to memory of 1816 3220 msedge.exe 86 PID 3220 wrote to memory of 1816 3220 msedge.exe 86 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87 PID 3220 wrote to memory of 1640 3220 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\28898868ced03fec43305608aca32bdb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xdc,0x108,0x7ffc36c046f8,0x7ffc36c04708,0x7ffc36c047182⤵PID:1992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,9707086191734748742,12703278127610309103,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,9707086191734748742,12703278127610309103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,9707086191734748742,12703278127610309103,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9707086191734748742,12703278127610309103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9707086191734748742,12703278127610309103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:1656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,9707086191734748742,12703278127610309103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵PID:1840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2192,9707086191734748742,12703278127610309103,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5892 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9707086191734748742,12703278127610309103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9707086191734748742,12703278127610309103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9707086191734748742,12703278127610309103,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5840 /prefetch:12⤵PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,9707086191734748742,12703278127610309103,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5848 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,9707086191734748742,12703278127610309103,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3160 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2144
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
6KB
MD5778a99aa3dc027730326499847f84ca7
SHA1664c013b9e1cfd49c4e73a77f1a11768c87af9d7
SHA2568e8f59a953ef2410330759963e9e1bf2f89d05058e28220528206da6fde98b2a
SHA512d9043bf8933b8cd9c5f6340a1f1b9d989e8f44fb9ffbd7285cf162063580dfb1620dc3d0523baed27dba17f2167638a0ffa7b996a1b13e0b00da27e042e82e09
-
Filesize
6KB
MD582f169452901d1afb72e58e82ddac96e
SHA170fcfce1f2a218ce6a8d0bed878fc8558c9b5617
SHA256c0f484331d98edae8c58e148d992dcc042de4753108f7e1ba368da12ad04ff25
SHA5123b9f8e176990490becd8d914751d1c2f71a93396057eee06b949f8838ce56e863c5a39ea83013fd08c1c0413dc4bb3dc9f6a1843a7b6bf691cae6ad4d1500eef
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD561f1fff28a3f10c9aa45cffd4ceab09d
SHA1c7ad1478b810db2a1c39c94a43ba2c8071e3a89c
SHA256e6cfa9d0a8d78915677f9f17f1847dc6cbbe02485dd820496ccf9ceeecf9bb44
SHA512a94071636919b0423dfc9ae904ec638550222ec965c4d6c90dd5835c9f79b7112f203128187eb26932d3141e0ee08aacabd9d3ff2c56e63b281a1557150a00a6