Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 13:20
Static task
static1
Behavioral task
behavioral1
Sample
30107232c5334fead601d770776131bc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
30107232c5334fead601d770776131bc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
30107232c5334fead601d770776131bc_JaffaCakes118.html
-
Size
19KB
-
MD5
30107232c5334fead601d770776131bc
-
SHA1
d24c230f44ecd9e61903da40e940ae774e9ec359
-
SHA256
e351d8141b8ac7e7696c2a8aa1a8e4486d7a7aba45d02fa4200437aa9de3e369
-
SHA512
204d405af9e3dcb2af2554f441b0a58056ef330a802e9a25414a56254b957ecac34f4cf9ce3f7172552ebe0fc9b1a1ba8c7983ff4a3653ffbb0ef4ee39bde28c
-
SSDEEP
192:vpFb/fFL66QKfXFDOe/VrWhcpLO3gDwZm1ZWdBC56z+6o4qz:vpttL69Kf1qe/VQcpLZDQdBC56znnG
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3596 msedge.exe 3596 msedge.exe 3660 msedge.exe 3660 msedge.exe 2284 identity_helper.exe 2284 identity_helper.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe 2488 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe 3660 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3660 wrote to memory of 4948 3660 msedge.exe 83 PID 3660 wrote to memory of 4948 3660 msedge.exe 83 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 1948 3660 msedge.exe 84 PID 3660 wrote to memory of 3596 3660 msedge.exe 85 PID 3660 wrote to memory of 3596 3660 msedge.exe 85 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86 PID 3660 wrote to memory of 3272 3660 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\30107232c5334fead601d770776131bc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4ff146f8,0x7ffd4ff14708,0x7ffd4ff147182⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1447342391030010540,4853181514351614789,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,1447342391030010540,4853181514351614789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,1447342391030010540,4853181514351614789,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1447342391030010540,4853181514351614789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1447342391030010540,4853181514351614789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1447342391030010540,4853181514351614789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,1447342391030010540,4853181514351614789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1447342391030010540,4853181514351614789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5100 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1447342391030010540,4853181514351614789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1447342391030010540,4853181514351614789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,1447342391030010540,4853181514351614789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,1447342391030010540,4853181514351614789,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2612 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\2ce19d74-7579-4355-a132-cf390b89b22c.tmp
Filesize6KB
MD50c50a99d91f08b4f2cde9bd79c749f36
SHA19d283eceaba7f0847de7b1f34853d2af02270fa2
SHA2563b8be9ee61cb11b21f076e807fc1034b61a6b756e18da2c6df1ce52b2f236da0
SHA51204b0d4bdfc657ad869acdb75497a80bdd680885997002affabeece1f495d7f074a00e7d9d53780a26365f5fea36a394d998e036d630fa3320b79dd251c5f4177
-
Filesize
192B
MD54504be822afde45227c7c983e574972d
SHA12cd028da10807d59c0fa25fed583268fecb64533
SHA2568a513676c2bafa5034ca0a7316c104999ee33cdc97d436d3486abf8745af562e
SHA51226039c20138628bd89035ca11a60685cfedb1146030c7dcee9b5e8d225d16893c6ca78d47063fd1d3784b0cff7e4a279d4741d9c8ce965c45c596bc9bd43e2e4
-
Filesize
6KB
MD5439a43a0fc394db52b4a3ac75fc579a7
SHA19b22cf3b88ac96b38c4a3dae93811a863952179f
SHA256c407ff7a30e107a9962bb2106fa9371cd2d38639a40453a84483132258d7473c
SHA5127d5a45ed2c2b7ffdbd02746af7513f53f8272391d6397408498bb8e5a14dab546bb59817c1707ff55002b67d507c22daab203547c4ce42220e56cc86c44436f0
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5df7514b9eb50604521f73e6d55aa7607
SHA1be064eb0ded49fab77bd2f29622d5a8fbf3de32c
SHA256ce6eb2bd3428c21d5b1458517d6edcec8d1ad11289b3aaf1f0553dbf38bffa14
SHA512e4d67ef7cde0a6e26f1b9c159f398930fa71f0b5b352e4b7c3cf3370e1e7ce1c4f0811ec61d6935cc27a6b8411326b3238ae517e101368c043929ec1f8abcc87