Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 15:42
Static task
static1
Behavioral task
behavioral1
Sample
30a41754d49fd8c6372750b3c45fbde7_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
30a41754d49fd8c6372750b3c45fbde7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
30a41754d49fd8c6372750b3c45fbde7_JaffaCakes118.html
-
Size
31KB
-
MD5
30a41754d49fd8c6372750b3c45fbde7
-
SHA1
a08dbf739218aabc654ed069dd5c095fa019b461
-
SHA256
bac57172c94510584fe0aa228197215629e42bc97b559ca2d251124480d93cf7
-
SHA512
557fa82a9770c18666184d1fe23ff276ecd3901af89054479525df21fc77b4b4de0d338955d8d8effcd4214b5d9561f2d3f16aef4999c171db4ade3a9cafd31d
-
SSDEEP
384:Jda4V/HkloMN4RznnnNvNyLfNvNyGn9RNvNy1nnrNvNyYnnDNvNysnnlNvNyAnnx:JtV44RznOn9gnVnRnTnV9Kihgq0ve
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 4812 msedge.exe 4812 msedge.exe 4912 identity_helper.exe 4912 identity_helper.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe 4744 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe 4812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4812 wrote to memory of 2888 4812 msedge.exe 83 PID 4812 wrote to memory of 2888 4812 msedge.exe 83 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 1192 4812 msedge.exe 84 PID 4812 wrote to memory of 3528 4812 msedge.exe 85 PID 4812 wrote to memory of 3528 4812 msedge.exe 85 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86 PID 4812 wrote to memory of 2952 4812 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\30a41754d49fd8c6372750b3c45fbde7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffedd6d46f8,0x7ffedd6d4708,0x7ffedd6d47182⤵PID:2888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,16123118107250226476,14615094014441065962,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,16123118107250226476,14615094014441065962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,16123118107250226476,14615094014441065962,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16123118107250226476,14615094014441065962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16123118107250226476,14615094014441065962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:3120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,16123118107250226476,14615094014441065962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵PID:1560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,16123118107250226476,14615094014441065962,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5124 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16123118107250226476,14615094014441065962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16123118107250226476,14615094014441065962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5232 /prefetch:12⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16123118107250226476,14615094014441065962,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,16123118107250226476,14615094014441065962,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5468 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,16123118107250226476,14615094014441065962,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4744
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2912
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2768
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
641B
MD59114b2565f2a8c05397c3bcbaaafdf8e
SHA1001cfaf5c370b46d2b04af8fefa95fb640d3a3aa
SHA256595ab38517ed0cf928e82f206f3d4e8806f8ef06e90c9df0bdc8410132c6f2fd
SHA51251763ee977ce42e3024209364c90305aae2e8b024ad4a7114ac4063b0e0a862f90e2ff6492022791ae0520c6f34b258386ceb27c8d01ca845d133aa0b5d7d991
-
Filesize
6KB
MD5d858b5f76577adfd9c7cb1e48df8295d
SHA11a1fb68bad663639d1000276ce04e1a596a8b0f7
SHA2567c928344d7f06be17f0c05964beac52212e6ff52cdb6ca8dc254aa3f594c2ad1
SHA5127b17b1ef7fb3f1e2759c3be1aed15ec907f5a8f621aa07b03c47ce1099d2873fcb929c17f938a7679a3df347fca959959c420283ae2e06f86ef37b008206f9bc
-
Filesize
6KB
MD54c25183d1552f82b2e67934dbb861dc0
SHA14e6c42d905b24dc80e8c18462b775bcbb1354779
SHA2567d83b705a88a1189bbfeb741021c12224d72a252f0a3cdd620ec06486f7fec84
SHA51259e4292a5cd856b21504622b8eb915c553ab41bde48eb692764c177bdbf8e3f0ba4611914cc41cd0d4fc189f6cba6522d1388b3ce2b2b2577ed41f85625d2a7f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5227258f5371c2fd45eed5fabf7f0c787
SHA173e0ccf797843c0c1d31547704b77482f906d3de
SHA256fbdefd5eb9eb9262e6500d6c66a4c3736a17e73d467c15dcfebab3595e1173fb
SHA512a5b2666c775eff68d50592979ba8b652681bc90b1551cc5318295bd70c2587019bb2ad31dcf94136201e4a5ee34806161f94b6eacfd64f8032cfb6a9c720fae2