Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 10:15
Static task
static1
Behavioral task
behavioral1
Sample
2f4cccc870f8176a5a2af2a574a6d465_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f4cccc870f8176a5a2af2a574a6d465_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2f4cccc870f8176a5a2af2a574a6d465_JaffaCakes118.html
-
Size
2KB
-
MD5
2f4cccc870f8176a5a2af2a574a6d465
-
SHA1
f704fdbdc5ec75a2f1b3645d20201ffe3a013f70
-
SHA256
f82b2e625d737e6fa648c6e798ca96cc2177a6f15176b6b60cdcab7bea23a70f
-
SHA512
8102ee25f13d864bd680e65a8978017984178b91be4b6b8a70d719e4a73deacbb6457dc396a532e4c229fcb9cbfea985ea472717ef05a6b124d3e02584106a4f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3856 msedge.exe 3856 msedge.exe 2340 msedge.exe 2340 msedge.exe 4360 identity_helper.exe 4360 identity_helper.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe 4524 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe 2340 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2340 wrote to memory of 4780 2340 msedge.exe 83 PID 2340 wrote to memory of 4780 2340 msedge.exe 83 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3496 2340 msedge.exe 84 PID 2340 wrote to memory of 3856 2340 msedge.exe 85 PID 2340 wrote to memory of 3856 2340 msedge.exe 85 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86 PID 2340 wrote to memory of 3488 2340 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2f4cccc870f8176a5a2af2a574a6d465_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa978846f8,0x7ffa97884708,0x7ffa978847182⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15383265709629920865,5468751647802524424,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,15383265709629920865,5468751647802524424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,15383265709629920865,5468751647802524424,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2712 /prefetch:82⤵PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15383265709629920865,5468751647802524424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15383265709629920865,5468751647802524424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15383265709629920865,5468751647802524424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,15383265709629920865,5468751647802524424,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5168 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15383265709629920865,5468751647802524424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4756 /prefetch:12⤵PID:848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15383265709629920865,5468751647802524424,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4696 /prefetch:12⤵PID:3880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15383265709629920865,5468751647802524424,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3504 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,15383265709629920865,5468751647802524424,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3556 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,15383265709629920865,5468751647802524424,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4524
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2408
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
189B
MD51c29b0ff7f57551e1dc8a35534c14f58
SHA119832dfb500bceeac68330981986a164a5c7f32b
SHA256f5a2b21735e05f353a34714f4f6824c5be22f61a42394a8a0dae39691c13f804
SHA5127e70b2707e7de33ac964c6fad7f4b52a1ffc8668d3c29dcf6ba72a2357678fddf1413b177a78e81d2fa2c694cd19d1835f151ba8d3da06bd26e396c2ef5967bd
-
Filesize
6KB
MD5c978853f92bd27de2b2c4c2153ab6760
SHA11dda7542edf2f8d648dad65e442123a8f268fb20
SHA25664806f18ff360d3fc807ce38ef5c091938f980280d8bef50e94cbb7471c96229
SHA5128afb3ae66b5748f71e776a20b20e6cbf52ade54976e3d09db0a69fe0876ad79abb1db56516cff6f4880a2caf1f10fc2414a2d9fbc70cde6d7a5b30b12a84d4ab
-
Filesize
6KB
MD55a27c4d3db5f96754c960083b5eac172
SHA1394f401df78b01d6639ce61c7301e0aa0c192b0b
SHA256f04ad8b2ea5151b2578ad03bbb14d27d1f95ebabf0727d316b82f7135d2d4c3a
SHA512728b1c44855d07ea665b5a920345b58d78bf1e3d024398c4fde87cf0d24eaca15f553900a517d3e1095e3a329a369c6c2ba5a4d19b44332fec048601c7094c4d
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5d696f7a7f3d6605e5d7e2ef98ffc18c5
SHA1b3aea266fae5d0a196251de841a4edd6870c4e40
SHA2562b1e48ce442c307356cd6f6d3fd8adc128e4da7c38d7b1a02792803946611a55
SHA51297ed4d5616b13eedcaddd6510f33415c849bc0433c74c0b00f75abde4cac815f6bbaa0a63b598f8fe45e2840b1fc90b7935a759a4e4ab6ce40e99bc8b4bad777