Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
2ff19891dff2924c74a7614591876859_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2ff19891dff2924c74a7614591876859_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2ff19891dff2924c74a7614591876859_JaffaCakes118.html
-
Size
214KB
-
MD5
2ff19891dff2924c74a7614591876859
-
SHA1
cd40df0d0db3c1fe4a361165d06338710522a52e
-
SHA256
92288e4a504ee007a1f5579a7f42b0dedcedab45c6d8c9fedfd3b5e9f0dc3e77
-
SHA512
2b5e840d04fbc6ab1ba0817da9e61372bff6bd8eba7ac420b6af7d2a5ec6ca67c9c3649da590decf940703212d102c8c4f3240cffd73ce7571fbcd2ecc6629df
-
SSDEEP
3072:SrhB9CyHxX7Be7iAvtLPbAwuBNKifXTJf:6z9VxLY7iAVLTBQJlf
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2912 msedge.exe 2912 msedge.exe 4024 msedge.exe 4024 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe 3020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe 4024 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4024 wrote to memory of 4824 4024 msedge.exe 83 PID 4024 wrote to memory of 4824 4024 msedge.exe 83 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 4600 4024 msedge.exe 85 PID 4024 wrote to memory of 2912 4024 msedge.exe 86 PID 4024 wrote to memory of 2912 4024 msedge.exe 86 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87 PID 4024 wrote to memory of 2004 4024 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ff19891dff2924c74a7614591876859_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd71646f8,0x7ffcd7164708,0x7ffcd71647182⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3913830698198069834,17907383525313480708,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:4600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2140,3913830698198069834,17907383525313480708,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2140,3913830698198069834,17907383525313480708,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2912 /prefetch:82⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3913830698198069834,17907383525313480708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3336 /prefetch:12⤵PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2140,3913830698198069834,17907383525313480708,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2140,3913830698198069834,17907383525313480708,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2728 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3420
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
6KB
MD569a098beeab908f1e76edf51f8941fd1
SHA1405eafed668330eb7729abd410e56caed0ac7e28
SHA256711880362af6c41ace0db3e4efd06ca203f62582d4abe6c797f9fef0b1452988
SHA512d89c588157af3cd864643bd4b87aa6438752d3194e853150627ad0d24d9a1ed2a89dfdac46e2967d6ee630d7b02717f97f599404607ffcf143dd6747bb594967
-
Filesize
6KB
MD50234697a97871080d7d1aee25d36317c
SHA1e55008ec1a96f8aacf0f334288e6a18573ed3d1e
SHA256af581eb5283dab5f67711134f8d54695396a6ebdbbfc37f0acf604c5e9c3a6d2
SHA5128f0ebd0f71115fa65a42b60bbdfefe8e3f8a0a6dc8df087ee5a4fb6abdfb041540a8ec4cd24020a79be29f463b348f99752bc927ce2d189e1e1aeb34e88fe67c
-
Filesize
10KB
MD5514873becfcf7dd18f75a3c11f58e202
SHA11bc434b1af54598dc175ee5e726a55bf531e15fe
SHA2564bb8cdab4b72ae5459acadec56555a9eef30eaacf1652eb14198bb8099ce0279
SHA512f99f1e7b0b93cd7b88c4120abc146884ce89068010412329e01261d11d85a1b7c499059ba817ecfc28770b48faa88ab6e6778ba4612747aa23bb05bb94dfaa7e