Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 17:10
Static task
static1
Behavioral task
behavioral1
Sample
3103cc41117500ef8d7fe82ce5f680eb_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3103cc41117500ef8d7fe82ce5f680eb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3103cc41117500ef8d7fe82ce5f680eb_JaffaCakes118.html
-
Size
40KB
-
MD5
3103cc41117500ef8d7fe82ce5f680eb
-
SHA1
ca7eeaf8ad5777a4ebacb7cdf6e10ac914857f44
-
SHA256
5245decdf590cc2a3cd71fc87fa082397f624bb04177911b8a5c90d29ba5d404
-
SHA512
781dae62b077c775ff163f781cbecfb996d05616f973d873c90c317844dc3dbeca6286d3025f38ca9e66bff2cad8d69763ba5c456b6c299af03cf7de0acb5ef1
-
SSDEEP
384:64DBdiL/937gW4h+XAjp/RW+ujFtFMEFCcNuy41xEuw:RDe/937D4h+XKlnkwcNn41xEp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1536 msedge.exe 1536 msedge.exe 4804 msedge.exe 4804 msedge.exe 5116 identity_helper.exe 5116 identity_helper.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe 4804 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4804 wrote to memory of 2872 4804 msedge.exe 84 PID 4804 wrote to memory of 2872 4804 msedge.exe 84 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 4512 4804 msedge.exe 86 PID 4804 wrote to memory of 1536 4804 msedge.exe 87 PID 4804 wrote to memory of 1536 4804 msedge.exe 87 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88 PID 4804 wrote to memory of 3200 4804 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3103cc41117500ef8d7fe82ce5f680eb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb6e0c46f8,0x7ffb6e0c4708,0x7ffb6e0c47182⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,9925686864789005193,5340942111654142273,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:4512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,9925686864789005193,5340942111654142273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,9925686864789005193,5340942111654142273,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:3200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9925686864789005193,5340942111654142273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2100 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9925686864789005193,5340942111654142273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2204 /prefetch:12⤵PID:3596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,9925686864789005193,5340942111654142273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3032 /prefetch:82⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,9925686864789005193,5340942111654142273,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3032 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9925686864789005193,5340942111654142273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5088 /prefetch:12⤵PID:736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9925686864789005193,5340942111654142273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5024 /prefetch:12⤵PID:4140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9925686864789005193,5340942111654142273,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4084 /prefetch:12⤵PID:2792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,9925686864789005193,5340942111654142273,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,9925686864789005193,5340942111654142273,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3900
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
337B
MD5efca5b315d0f81f0cf23ea878ecd6575
SHA19b3c64019486f847f19271c6069dd97fb0980d27
SHA25606fe2a7d5a5dbadd368107bb3a43fabd11ca42d6e372a4653194bb5810484781
SHA512462a3fe01b183c2603c8856ccb187f87c244bec13f58001b57f2c18307e08cf2e34a38e8c3a13eb063f3737ef5c8d3c3e67ab9b1c1cca971e5dc12e94c1c128b
-
Filesize
6KB
MD5eafea49d41adc64fc3cf78ad26a43c1d
SHA1b8b27a233ac65be5036d488709941f84450c1980
SHA2564c711cab8fe112acf4079edad11f30b9717ccb2998516993d1f0d128fca96f46
SHA512995581bcdd568ad313c48f958f9959a66743c3c00f12ae95adf07e3c85277d05b20649dede825d550525dc0035fed0a5f62e89f09fcb880887558d0bda5f0b8d
-
Filesize
7KB
MD56a24339dd0f3d59327b1917fd1d26c6a
SHA11a57e85c71209a9247c95a863de7e6dd5b007569
SHA256cab657ba6d1061ea9bad225e8debd811adb02315092a562a896f8b1af70eea5c
SHA512eeb0a9fece8d649b9a2ff507167f882db1281c2b994d55944837534abef19269d6abdcc4477c0091cf101251d59ce494065afed11e4cb5ca579054f9f2dde78a
-
Filesize
7KB
MD57e65dce4864f798ccbdd2b9cd48acfb7
SHA1fa5bda28825e680db1253d589ac9fc5ffe7556d2
SHA256457cc2a5c73313b6e023d6d3c21f81fe1c3b1a58b6237906351f8467cd85b697
SHA512eaafdaac5cb192e17fa20a4ed06942b267c1782d45428dda87e046bdf4955377eece602bb80f5c1fc39c12fa0c260a0cc6502a8ea7d660ef9f12c6c2eeb86986
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD582a9d20d810f9020e0255d39454f2861
SHA1a27cd33c8683f6b390437785cca721ceeeb94391
SHA256e0822f6d9c5359e777b8dade88541da76194a95e2c474f510474eeb129429d47
SHA512dbc17dd17f65f3bd95690719a20ba7f0e93b153096c8524ae980a78a842e95943d2eeb7972bad5cf54d724cc198ab07a7867257fa968a01db775db5239c212e3