Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 08:12
Static task
static1
Behavioral task
behavioral1
Sample
2db82e9c8ffa4891194ee878e688713b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2db82e9c8ffa4891194ee878e688713b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2db82e9c8ffa4891194ee878e688713b_JaffaCakes118.html
-
Size
214KB
-
MD5
2db82e9c8ffa4891194ee878e688713b
-
SHA1
e52ddc79bbd49328b9345090b7b02c9da71ee68a
-
SHA256
35c2143154e610a517b134c8412e2c0dc836c480ed9d50371e2e722f649cf1b8
-
SHA512
7ee1596bc6396a2282d022a478784b312a098081aefcdb03b3eb61128e9a732cbab93cc9bdc29cd5caa4a565ca2d76539dc26fc1db4758a763b687aed708075f
-
SSDEEP
3072:rrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJKY:fz9VxLY7iAVLTBQJlKY
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 916 msedge.exe 916 msedge.exe 4992 msedge.exe 4992 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe 4992 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4992 wrote to memory of 2176 4992 msedge.exe 83 PID 4992 wrote to memory of 2176 4992 msedge.exe 83 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 1168 4992 msedge.exe 84 PID 4992 wrote to memory of 916 4992 msedge.exe 85 PID 4992 wrote to memory of 916 4992 msedge.exe 85 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86 PID 4992 wrote to memory of 2628 4992 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2db82e9c8ffa4891194ee878e688713b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83d4446f8,0x7ff83d444708,0x7ff83d4447182⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14632117270304205401,10263702708541679380,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,14632117270304205401,10263702708541679380,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,14632117270304205401,10263702708541679380,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2852 /prefetch:82⤵PID:2628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14632117270304205401,10263702708541679380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,14632117270304205401,10263702708541679380,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,14632117270304205401,10263702708541679380,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4816 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2808
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
6KB
MD5b7761476d5a4c0b0e14419eec691b993
SHA19b6c713539687e4a36c968cbfa5b86e8a3df16f1
SHA256b2e75005233f7b68e2c423d725557feb37aeb833461fa0532d9f1299e28c13c9
SHA512f66e9edd59da01c13b62c35b4750edfbaa4f7de506cf0a4c93ecb3f4cb668db0f6cf467862aaa790c0ed80a55cd0a2d133638d7dc85e5dd002a9c04816256bb4
-
Filesize
6KB
MD546b1da9ee76f5e8f25711f176efe42ab
SHA12bcd3c3168296e47912142d6ab57d4f98a9d2072
SHA2566d95d07cee2a83468a39d299cff1083cda764602563956d79d21b6edf4ae4715
SHA5127e0d47355a002450dd4268d2c1633e0d21a8000adf92cf596e3ae6d63e81c0bf01f94822e7635c7ff9ffe7eedaf4e105c20792729828157f168a9c1f414217be
-
Filesize
6KB
MD5fae029e2a585e8c69c8f50eb4c668bbc
SHA1f1e9d26be9e19731201a20221bf4f0067d78ba07
SHA256b958918ca349a9649c22ce47a90d52ccacb9673ae16e4a3a1c53fb054dbb4b2b
SHA512a80cb1e4f89ee042b24cf4c64b561383e2621f1990d9e7d530fd36432cecd20fd23280b759e32a3cdbc1c59dac9941af5e924560f2892f8e422068e0aa2a57f7
-
Filesize
10KB
MD594992edc71e093283120a9e21d2fb1d4
SHA15daaa6d7d6bace5deabd1a8e912dc8a1a99e02ea
SHA256e1ef98da99e5d7bb131403767fdd570ee93d5c4c2970beef0c42bd0acb3a605b
SHA5128a8211af007a4bbb4006dba407b2ee477b11426cf53c8ece16cb70a5d6ac362da4e2e8c0c19005e737b5ea7107df95bd9579e9adb7be57781b5d804dc9e14956