Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
2ffead1d064fece7c2cbee008ea5e895_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2ffead1d064fece7c2cbee008ea5e895_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
2ffead1d064fece7c2cbee008ea5e895_JaffaCakes118.html
-
Size
138KB
-
MD5
2ffead1d064fece7c2cbee008ea5e895
-
SHA1
ce3f2471ba02b57b367fdd4237d202f0199e1d05
-
SHA256
7799df10b41fa81f563de8804e8b8b91b3ad9747d0904296ce1201e48722c25f
-
SHA512
b8a7afaf9595c270ba0b3657c17542f829d702772b7c25baf322a5ebb17928e8e73665056579d9ff0c52e8361008d73dc5a2c2704a0c16ea9d3246f9736ff87c
-
SSDEEP
1536:SKF+HEeSlsbRq/eyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SKJIY/eyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4032 msedge.exe 4032 msedge.exe 4132 msedge.exe 4132 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe 3032 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe 4132 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4132 wrote to memory of 3256 4132 msedge.exe 83 PID 4132 wrote to memory of 3256 4132 msedge.exe 83 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 2560 4132 msedge.exe 84 PID 4132 wrote to memory of 4032 4132 msedge.exe 85 PID 4132 wrote to memory of 4032 4132 msedge.exe 85 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86 PID 4132 wrote to memory of 1484 4132 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\2ffead1d064fece7c2cbee008ea5e895_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa6d5d46f8,0x7ffa6d5d4708,0x7ffa6d5d47182⤵PID:3256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,354782943119437908,9865346138305758122,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,354782943119437908,9865346138305758122,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,354782943119437908,9865346138305758122,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2916 /prefetch:82⤵PID:1484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,354782943119437908,9865346138305758122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,354782943119437908,9865346138305758122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,354782943119437908,9865346138305758122,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4572
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
6KB
MD5208d01e85bbf1b10296d18c8e0b71e88
SHA159f83d698277621eb5b988be39cdc947ac6c8387
SHA25627cd6335a4b130924b06b82716dd12caba3985613ec9982ba76cf5e50fc7caac
SHA5121bdbb7ce6d6e65754f0e41a05627a0ce16f135816c77c914491403c07b4ea93422f0f6846d179b6760f2e9e28f23b587f03bc9ba5ab935745ab6483f401be724
-
Filesize
6KB
MD547cfe8378db7551ca897fadfff9f9ab2
SHA13698dfaf4033da13f0bf47ca3a4e12d1f3165f98
SHA256b87a5cca771cd5ec3d1713f4f615f75a2b65b3efe3ebb00411e5b4ddb571d39e
SHA5128eacf6f4e2002ad28788986900d351ed0004262fd867f23980928c146f2ce86a7336ed8dd20c90c86ff17e60cb6fbe3f8a4eb7c3afa073a69bb687180c65b301
-
Filesize
10KB
MD5f6e6e3840935d81f5dd39ca29e93236b
SHA1d1bbd09cc7f97ff720d248d0e4134c8e7d7f1e66
SHA25624237e37f8e91428911aed06961b663405aefd10d2dd37fcd8e68e928cc37e27
SHA5123b363bade79157792c9e9a51843d4bd9decb8a04b67aa80576c8eaccc4d639c1a0944acb99a69fb771267ce44570345fd8efc2aa960926a3638140b496245338