Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 02:18
Static task
static1
Behavioral task
behavioral1
Sample
2910d3825ddd99b55428f004f30a4dc5_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2910d3825ddd99b55428f004f30a4dc5_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2910d3825ddd99b55428f004f30a4dc5_JaffaCakes118.html
-
Size
26KB
-
MD5
2910d3825ddd99b55428f004f30a4dc5
-
SHA1
26f2a3193d651b4fdd1548944fef60aa6b761810
-
SHA256
d70c15f9769160dd3e83661d63c222059c54c52406832dc869fbb4c12e7fb49f
-
SHA512
1b9ba13cbbe73ba82dc77a5b7e08f62e8e695c3b586cbf510e90e7bbecdb64ab9f799ce4695550f1c6c4695f93e5ebf25bcd561003dfede0d9244014ba53a896
-
SSDEEP
768:SXWt3antt/M+kQS3fyW/hQMPvz+Am29jrNZGioeMpP:SXWtKntt/M+tS3fyW/hQMPvz+Am29jr2
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3548 msedge.exe 3548 msedge.exe 400 msedge.exe 400 msedge.exe 2140 identity_helper.exe 2140 identity_helper.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe 3848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe 400 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 400 wrote to memory of 4400 400 msedge.exe 83 PID 400 wrote to memory of 4400 400 msedge.exe 83 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3200 400 msedge.exe 84 PID 400 wrote to memory of 3548 400 msedge.exe 85 PID 400 wrote to memory of 3548 400 msedge.exe 85 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86 PID 400 wrote to memory of 3772 400 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2910d3825ddd99b55428f004f30a4dc5_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84c8a46f8,0x7ff84c8a4708,0x7ff84c8a47182⤵PID:4400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,667221975028687602,12878074394552529221,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:22⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,667221975028687602,12878074394552529221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,667221975028687602,12878074394552529221,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:3772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,667221975028687602,12878074394552529221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,667221975028687602,12878074394552529221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,667221975028687602,12878074394552529221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵PID:3744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,667221975028687602,12878074394552529221,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5184 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,667221975028687602,12878074394552529221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5180 /prefetch:12⤵PID:2212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,667221975028687602,12878074394552529221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,667221975028687602,12878074394552529221,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,667221975028687602,12878074394552529221,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5672 /prefetch:12⤵PID:5068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,667221975028687602,12878074394552529221,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
6KB
MD578f7ab18d3e2f57d54e84f6d9ac7f9a6
SHA1a2d8ac8538ef724a70fde25714da38b89fffe164
SHA256f42dbb78fc0a5193836268fb7853cd55b38ae04c81cef95f587a0a36a31b9198
SHA5121c8c94eb94472f8b6937119c5da9bf19bd7d8d57732023c462578d9b30396f89c278bad5db4d07f02c1c0d5fb33ae2fb01584c84f3a640bb0c4d22a486479fa3
-
Filesize
6KB
MD5516cf94dfc03510b47edf73a377a7f88
SHA10b16ab0eaeb120ae439af267d456c6c37e824efc
SHA25648d9aa1daa1d430592b283b39f008be2f0373e1faeeeb79f98e4b65eb32cf503
SHA512752c35b78f1a8d0710cab2a2f780ca21ee7620b7350a42623693a67c65b76dfc56b492dae6a9c283a8167f5d5c215fe86ff376f716c39d4dfece2a5d1806a007
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD52670301ddddbc01fcbf09379e9e62452
SHA1023d12749438192c1429a098e4479a79af114a01
SHA256e5aa1e6cf770c4c3ed07ab7a79c4d40560417ba3e5d2bb29da5f0d5de0512c2c
SHA512b096cad52742cf7ab6ba52c91f9374841fb537e21a5f9385f676e7ae2e0547c21c3f6064d87426f4353a4fd5aefbc908917d630d4e90551eccc955281b9b5f0b