Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 15:26
Static task
static1
Behavioral task
behavioral1
Sample
3094a0da77bde87facbd67d6c3479c12_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3094a0da77bde87facbd67d6c3479c12_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3094a0da77bde87facbd67d6c3479c12_JaffaCakes118.html
-
Size
22KB
-
MD5
3094a0da77bde87facbd67d6c3479c12
-
SHA1
90650ce8bc1e4175d6e47bb5711c5e7c665cf67b
-
SHA256
6f75cf37063a71886f0aa4b9fbe485f5c729138eb8ec9b8f02df86fdaaabc1ab
-
SHA512
0e88989b34bd503ac8f0f6e01d32f53944d61cec2bb3b3af5cc0851158640710040070da9a2a84f3ce1dc12e53ee74ed9af40e7391e0af76dffbdce78fafd140
-
SSDEEP
192:a9xVjWtbJ90QlEd9qDL0qtxvXKmJ1t1uZbxi/WgfXsxF92oNTZi8vQCPjObeal:FhlJDL0kJaIjgt09s95IsO6al
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2372 msedge.exe 2372 msedge.exe 1760 msedge.exe 1760 msedge.exe 3264 identity_helper.exe 3264 identity_helper.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe 512 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe 1760 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1760 wrote to memory of 412 1760 msedge.exe 84 PID 1760 wrote to memory of 412 1760 msedge.exe 84 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 1804 1760 msedge.exe 85 PID 1760 wrote to memory of 2372 1760 msedge.exe 86 PID 1760 wrote to memory of 2372 1760 msedge.exe 86 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87 PID 1760 wrote to memory of 2540 1760 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3094a0da77bde87facbd67d6c3479c12_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec06a46f8,0x7ffec06a4708,0x7ffec06a47182⤵PID:412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14898900107080592578,3644088166983036179,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2100 /prefetch:22⤵PID:1804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,14898900107080592578,3644088166983036179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,14898900107080592578,3644088166983036179,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:2540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14898900107080592578,3644088166983036179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14898900107080592578,3644088166983036179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14898900107080592578,3644088166983036179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,14898900107080592578,3644088166983036179,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5180 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14898900107080592578,3644088166983036179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5144 /prefetch:12⤵PID:3060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14898900107080592578,3644088166983036179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14898900107080592578,3644088166983036179,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3856 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,14898900107080592578,3644088166983036179,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:12⤵PID:1916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,14898900107080592578,3644088166983036179,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1352 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:512
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3384
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
475B
MD59dea9db38260c9ad233aac62433fd2eb
SHA1a55409c1d9e011d2d714e135240d715eba961d0c
SHA256ba5768b743b0bde09442e6c28a7f7f17938be0aa281c1fd92ce9d9060c93b38f
SHA51224c147bd2dd5655839a7e9b7c54c139423b95e90555afa6a24543c0080167096d64b78a56baf16d7d897a3958666fc5d8dfb74c5e3ac14f7baa46972c975f0de
-
Filesize
6KB
MD50bb4eef3afd0b7c6ba1da09432af7450
SHA1d7d7a51e324498c9ff7cef8f25043433b02f7f08
SHA25611cc0d0cbc03420fbf25cb762de17304568c441efac29fa112c222fbb00042ec
SHA5127dd95421e3b69869414bd506ed2d8a21cfd1b10a94e227689cd469319679385e4aad7d50afd639c9fc3739418232560b34c77d5319262f4f5127461b2b2f2058
-
Filesize
6KB
MD5c28be0d49b37297453da3dacdfcc6b64
SHA1e608da17e86814a8443d644a13edd90f572acc4a
SHA2564623dd0528b6ad014d17fe8ad65544e29f3511f29df916e2ed26a76d5eded4bf
SHA5120dc37c8e6e4462b7fa8a0c827ca4e88eec91003503f556316293ab563dc966e32fccd067d248b40af39201fe440a1357cc47071c4fb15fa6c4cc7cf65f22d459
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5be4485fad949a841eecfe9574bc24656
SHA16a6b320ac294a0a96a86cd43799721330195616f
SHA2563ea4fc22e409f5b24d0218e2c4c547a15c1ebb7a114482cead6ff445b00bc389
SHA512b06e03f8b2602ca0a67390b8fc7e04e61f56920f81f5bf98f2631194555de6df6bdf74e10d172625b29bcd4ea9c61b37364a7c3b2af08ffbd0ad1b6e1f875067