Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 02:32
Static task
static1
Behavioral task
behavioral1
Sample
294219df5e36a49a46eca2a13eea44a2_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
294219df5e36a49a46eca2a13eea44a2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
294219df5e36a49a46eca2a13eea44a2_JaffaCakes118.html
-
Size
138KB
-
MD5
294219df5e36a49a46eca2a13eea44a2
-
SHA1
063d3c48b713ad469c634e0928f092353389e500
-
SHA256
11fdaea9a4873df343e777e02bfdaa9daf09e1f2d81d22ded5e3c9a433f38242
-
SHA512
ba680ddb7406d36e15e266880e332285395e5768b14a507fb41572cf636e784334c8c5052e9048d4a48101515435656c956399d5c93cc4c404535bf10855bac2
-
SSDEEP
1536:Sj9ZjV3qdyBX6Y7gJlR2LyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:SjvxgV2LyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1508 msedge.exe 1508 msedge.exe 4260 msedge.exe 4260 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe 1040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4260 msedge.exe 4260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4260 wrote to memory of 1092 4260 msedge.exe 83 PID 4260 wrote to memory of 1092 4260 msedge.exe 83 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 2728 4260 msedge.exe 84 PID 4260 wrote to memory of 1508 4260 msedge.exe 85 PID 4260 wrote to memory of 1508 4260 msedge.exe 85 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86 PID 4260 wrote to memory of 1264 4260 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\294219df5e36a49a46eca2a13eea44a2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdce0346f8,0x7ffdce034708,0x7ffdce0347182⤵PID:1092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,14445176549203382477,8617540214552539675,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,14445176549203382477,8617540214552539675,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1804 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,14445176549203382477,8617540214552539675,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14445176549203382477,8617540214552539675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,14445176549203382477,8617540214552539675,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:12⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,14445176549203382477,8617540214552539675,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2712 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2468
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
6KB
MD52c4d3c72f6a925893336de7f5e7f962f
SHA1885b6f048eadb94c16badf8719ca8467a56e1cf7
SHA256e668294cd8370bf3c89d245f8dd68fc91f2672748a8856fcf7f38b209a2c00c3
SHA512dc91d018934475d049f79edf5b960bcc461b2711967aad83afd0b66f376579407957d0c8e36390009065f78ab7bcc20889fb7f828fcb4db17b1a902dcd760498
-
Filesize
6KB
MD5b13ade1c3876baf6c3e6299623036c31
SHA1343fcf020ea98f6df55a5112c2be22a9817efeb6
SHA256d6f01fc49f0c29191e8d3f84f38ccd4ad2dcedd68e7d1dc6a98b5b34d97a16e5
SHA5124c38150fc9323433c8f221adb592c0b3ff2dcee9042268659577a80a7756f841ea298611808f74de6ee4d63fe8e44a92b4ab262c36109001ddf4b81ecc69562e
-
Filesize
6KB
MD56436c03caade63ac46a3b2e89814b826
SHA1bb32a48cb54a6450187b219e11ef23d71af40ec7
SHA256f8dea1f79df547d16b4b8f70edd06c2037c94903632cc8425f5a1675657e419d
SHA512aade5ae8e1e49de6eea39a990ea9a29c9c4fcb1bbdd0bac2e6a9acb8242d2492f02e0ffec2eed9e8fb5a5ff3a667492c0e95b05c238aa7ecf32fb65995755bb9
-
Filesize
10KB
MD572f4312e4713a363e3c5d7f89064a4d2
SHA172208ad87fda522b271b25b972feda8aaf979563
SHA256a259bccf2083068d573ec19c1dffbf01980700fd5e24753e70975cd863e9f823
SHA51289427049a220a9d6e24b7effe4a2c83887d6412a36eb0280c0405bda0754b53859c591d1a4124451cf5ccb255c0e0b1da38ffbcac9c02b086aeacc058c28d0ce