Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 04:08
Static task
static1
Behavioral task
behavioral1
Sample
2a947f37624a4f6d9f4501da955e1c97_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2a947f37624a4f6d9f4501da955e1c97_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2a947f37624a4f6d9f4501da955e1c97_JaffaCakes118.html
-
Size
8KB
-
MD5
2a947f37624a4f6d9f4501da955e1c97
-
SHA1
ab81905254c45f7bdf9cf191765ef89b674f1c1b
-
SHA256
0128c1cfbca6976885765827f66a880d681ca9701b04b9a0435e9d689d925f15
-
SHA512
5708361b34901da17328c6bfe6c3ed27e9f5dc6db5db000f69672e71603bd13e408fa5d0d5e40969a0f19b9e8d4fa5d6602269a92f86b6e193a41e3e24bad8ee
-
SSDEEP
96:LCYbK+5oM82OFuN1L1Gty+0N+IWQQhTJFFZgPdGkh5oNBq:LHmEo/4N1L1s++xQQ/tckNBq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1052 msedge.exe 1052 msedge.exe 2064 msedge.exe 2064 msedge.exe 2864 identity_helper.exe 2864 identity_helper.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe 4224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe 2064 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2064 wrote to memory of 2848 2064 msedge.exe 83 PID 2064 wrote to memory of 2848 2064 msedge.exe 83 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 760 2064 msedge.exe 85 PID 2064 wrote to memory of 1052 2064 msedge.exe 86 PID 2064 wrote to memory of 1052 2064 msedge.exe 86 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87 PID 2064 wrote to memory of 1224 2064 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2a947f37624a4f6d9f4501da955e1c97_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9a2d746f8,0x7ff9a2d74708,0x7ff9a2d747182⤵PID:2848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4320889629042715505,5907470835080295102,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,4320889629042715505,5907470835080295102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2520 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,4320889629042715505,5907470835080295102,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4320889629042715505,5907470835080295102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4320889629042715505,5907470835080295102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4320889629042715505,5907470835080295102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2064,4320889629042715505,5907470835080295102,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5240 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4320889629042715505,5907470835080295102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:4760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4320889629042715505,5907470835080295102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4860 /prefetch:12⤵PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4320889629042715505,5907470835080295102,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,4320889629042715505,5907470835080295102,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,4320889629042715505,5907470835080295102,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4616
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD513699b83c36378aa1e64e64eef2f46f6
SHA16f55e1083d65e61d8b0c1fe50ae7ad79bfaec0e7
SHA256a15f2d03461110c937f32d2c7f1764bb07c51a183bdae9a0c54515fdd0cfabe0
SHA5128859aba54508deb794507bc4b60067e624724b14fa7c986e07ec054f9809b13c1faed9787f40d29efee8c06e3e8119386d37e7a3c120ba1e62af25797331d0d0
-
Filesize
6KB
MD5e486968b73f4894481b401817a7a1677
SHA1a7c20fb83986aa89216fa71a9f453a886b07fce6
SHA256fa2ce0be03340d2950da9d5b80af12fe9a68ddfac66a12ef08b151f536dee41a
SHA51233f87efe347d7acf99cdfce02ac855c81cfddb8d078dd287e9d62230f5f6ba9234d699d1bc977def853fa5174d1adc44bdf56b33709f61b96703122adfe5a9e6
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5fc3e4957a2f3863e382a6be18b7f2dbb
SHA1958d34a2e8be113380cd125b9cdbd82c3ab6936d
SHA25644460a4dea84b7830234c121b28db329131683d009f9fae39b3b361177f50f09
SHA512c3836dd4376ba62d751db6b0f1ebe4c78e154a9061826f85fa20f93fc5336f06d0729f3b349a438696391263447084bf8400689fd67c7aa7a434d9b681919ffd