Analysis
-
max time kernel
145s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2024 04:14
Static task
static1
Behavioral task
behavioral1
Sample
2aa48143ee0fae282aa55e00851e5c5a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2aa48143ee0fae282aa55e00851e5c5a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2aa48143ee0fae282aa55e00851e5c5a_JaffaCakes118.html
-
Size
37KB
-
MD5
2aa48143ee0fae282aa55e00851e5c5a
-
SHA1
5d981f03b47dac2cf6c9a3017a0fff1ac6b2e09f
-
SHA256
676d237c1d348c5314946ea5869d2aa0f028187b43d87a22ae959c674179c58d
-
SHA512
eadac8aec337875cbb7c07658447463981e2f826939647aac91fb6f93b739922fc1f1dcdfb93258c4b7c9cc99584dc97865a0db18c6fd9741f369c2597f01e64
-
SSDEEP
768:S9S7joqGsqGb2wQzR5OkmKJZH2JaGRXamidaGnEmehH2csw:S9S3ozszb2wQzR8kFZWJRigGEFhH2csw
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2012 msedge.exe 2012 msedge.exe 3224 msedge.exe 3224 msedge.exe 520 identity_helper.exe 520 identity_helper.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe 684 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3224 wrote to memory of 4204 3224 msedge.exe 83 PID 3224 wrote to memory of 4204 3224 msedge.exe 83 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 4012 3224 msedge.exe 84 PID 3224 wrote to memory of 2012 3224 msedge.exe 85 PID 3224 wrote to memory of 2012 3224 msedge.exe 85 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86 PID 3224 wrote to memory of 4468 3224 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2aa48143ee0fae282aa55e00851e5c5a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffabf6646f8,0x7ffabf664708,0x7ffabf6647182⤵PID:4204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1591007623875237925,4436021234956647893,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,1591007623875237925,4436021234956647893,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,1591007623875237925,4436021234956647893,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1591007623875237925,4436021234956647893,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1591007623875237925,4436021234956647893,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:2328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1591007623875237925,4436021234956647893,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1591007623875237925,4436021234956647893,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4708 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1591007623875237925,4436021234956647893,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1591007623875237925,4436021234956647893,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1591007623875237925,4436021234956647893,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1591007623875237925,4436021234956647893,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1591007623875237925,4436021234956647893,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5236 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:684
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2228
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:684
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
6KB
MD52c4006149f9813d048ca311b7f01843d
SHA1ee1aab21ac1fe0ce9150a5738a5d4e708593c67d
SHA2568294025789b2f5ebf23569fecab71ec3887bd196fb98d19be9cdc0b2f220a374
SHA51287ef516618190e93c1e9cd9eb3d1b5b54ee037d3f4cd5ac156c5ccec19a0396b39cdefecedd0775221139125985c8b0fa68a23e9b1b027ff8ab1ec98cefd11bb
-
Filesize
6KB
MD584dc10af12d774f906820e6deeced507
SHA13d3374de8705effe8598718943e93950039ff944
SHA2560cb6fde0a820e0a834190bbd38f20e427d7465bdf311a824dd722214cc9fcaa3
SHA51263fb5d53e146126e075b5ae99556379220feb7f790287a28349f3bbbb5fa52ec8f3082700bc57e901baa2635fd1efb161ef223597d0e50573a8bcf2ed128c506
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD59976b57c8614f6f128c04374ece64161
SHA1535c809098467546b97ba0672c60b572f3f98c5e
SHA256fda13f5beef7554cc6ebf096c7b881643d9dae9a60adaa97246d45bff573b6dc
SHA512e0ced67eb48feb21bddc32be30d9ea35cbd6b84da76b785be044a605ff464d026e7442e40c4b61167a51e57fff5b8f0580d50ffbacd12b3d50c75d92e1b79a8d