Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 19:22
Static task
static1
Behavioral task
behavioral1
Sample
3177e456e303eb8b1e17a3a57c6cb6a7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3177e456e303eb8b1e17a3a57c6cb6a7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3177e456e303eb8b1e17a3a57c6cb6a7_JaffaCakes118.html
-
Size
56KB
-
MD5
3177e456e303eb8b1e17a3a57c6cb6a7
-
SHA1
900815e9f639b6f0d392e40943cf77617e2a2e23
-
SHA256
f8072e2eea064ef3efefda03102af833ca2aedcefa6b4e5fa3c62d9b3d771714
-
SHA512
9e178149cd289849ac83ade2174e451f6b08bc5caec78e7fce4321201eccf38672b667e7bee9a291b70fc01aa11f87eaf7b9bd0258692a0c2512aa54a0f3d07d
-
SSDEEP
1536:iV+lA4C8BWKq0aC5kZ4DjpiKiJKxrIUpMxcBMr8B8IH5:iV+lA4C8BWKq0vDjpdxrIUmxcSr8B8IZ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5028 msedge.exe 5028 msedge.exe 4324 msedge.exe 4324 msedge.exe 4452 identity_helper.exe 4452 identity_helper.exe 424 msedge.exe 424 msedge.exe 424 msedge.exe 424 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe 4324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4324 wrote to memory of 2012 4324 msedge.exe 83 PID 4324 wrote to memory of 2012 4324 msedge.exe 83 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 4536 4324 msedge.exe 84 PID 4324 wrote to memory of 5028 4324 msedge.exe 85 PID 4324 wrote to memory of 5028 4324 msedge.exe 85 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86 PID 4324 wrote to memory of 4316 4324 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3177e456e303eb8b1e17a3a57c6cb6a7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95ab546f8,0x7ff95ab54708,0x7ff95ab547182⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,3056785469203224939,3972522564138871323,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2252 /prefetch:22⤵PID:4536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2232,3056785469203224939,3972522564138871323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2232,3056785469203224939,3972522564138871323,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2448 /prefetch:82⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3056785469203224939,3972522564138871323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:4008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3056785469203224939,3972522564138871323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,3056785469203224939,3972522564138871323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2232,3056785469203224939,3972522564138871323,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3056785469203224939,3972522564138871323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6080 /prefetch:12⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3056785469203224939,3972522564138871323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5008 /prefetch:12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3056785469203224939,3972522564138871323,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2232,3056785469203224939,3972522564138871323,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3516 /prefetch:12⤵PID:2020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2232,3056785469203224939,3972522564138871323,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4836 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1488
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
1KB
MD505523b2ed9cdf15c66fa736163697652
SHA144e481927d109fd63fa03c3bb7f4cd158ded5577
SHA25631462b9d3ed15ea7f84b3cb354879496c531a887ae4675a6e58a531ed5f812b2
SHA512c22be1285d0200d94590e14350494b34f7d72b98f288703dd80c973778a3fceae3c4288939092fbfa70803366c9c2d1f1725a19880ca3485baba382eb803f5d7
-
Filesize
1KB
MD55571458bc2c063e8384d7a9dc31ccc7f
SHA1e0543dfddd607af2eb4f3cea4829cbeefacd7650
SHA256842ff607bfa241ad86dfbb62ad0267ed2ebc99df5d07649d4fc9dc6009510bb2
SHA5127d38d9e5fff94477791b6ecd5dd66f24c994b2b0036274c8d40265270da6f24f8f099048596716a4e8aac58b53946964a7857e4ab5e1a03db187e189d1a5a084
-
Filesize
6KB
MD5e30fc82eddb18b3ebae5ca10ef371040
SHA1054f271389f8ee4ca313fbf2573c1b0da8323ae0
SHA25632a7ac7d3b866c848c5781d0b03fd9b89f27c504f11b6739bce087df6148848a
SHA5124ebb93cbab6dd43d8258d23db934be2dcd7ade986571c298639d1e7fbcafe550bf4203bc716f69886c2d67b7e3346a75210a86214158e041fb0f74b9a1d92dde
-
Filesize
6KB
MD5bc5afe3ec4f4b1fdcd7a076ca282833d
SHA113631f31928d7056ad1234c39bd66f4421d50633
SHA2568df4a4ef0489489abcc7df7452f7f6bd7380a83d7afc6f3b1c317e5b5b2d1979
SHA512d48ed0500d45717dee5b773f7c07b3cd822dd2b4b7d2b3e99c61b71b2b579a66f248249af887314ba491352f18873b6c72006b18f03afc4d9b064afeb14b3810
-
Filesize
7KB
MD5d4c8fc675214959a2bb15bd08e608f65
SHA183f3f5396756a16fb63676e8d32c20248ac95c95
SHA2562b3d9147f1c02d6389456143af13c8f21818e515937d5019be47df7d89e56765
SHA512f3c4a037cd340e49976751bef4d54fe6295fc51128da19ad8333c7d8838802e0cf50680609f6baa3222de73b062787eb9807139809c72fca058316c7cdb5f6ba
-
Filesize
372B
MD5c7863f54af6370aeb9ca2f693d973cff
SHA118a882d8e7eb9010f5a38f69603014f757cfc033
SHA256f2a4763591c627dcd7dc7e9449d4de18a91eec480d628ce7fb0557e674d5d56d
SHA5120861d4013aaa351c00beab2f33cddb76b51531513385d49d44bfd312ea891775481563ee97b76dbc2168da18ddc15b96df3fb3d2872ecf45b6d15f63b1efd03b
-
Filesize
204B
MD5db4c904e68a981e3d7131261caa7b55e
SHA1d264e2eed956f7e7046b7081c2f95227decf440f
SHA2564f45745faa817739e05315467ee23d719c076435224a1854dc55d5edef137e6d
SHA512b8de0b9925c13d0d322d895e9123e6443130f6ee95d93399979c5bdf4f8a3ddaefad3325badbc6ea427bfdfe649840bf0920ca1bd097b4acc2986892c5bab857
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5194d543490a1c29b755af3fe0ce1acb3
SHA1f4b042c1c5bbe1d938d5a4788f1095d19d755e4c
SHA2561fee63ff32acc4cf586cdfbdd20a9b426c7ce6d1ff22837a29856606d50bf736
SHA51262fe33fe3a2faf6c3bb9531238e1c1d55d5c3e505ec97825c6c6d667e13b8d2ed47d72a706e7ce3b1d6645377776344b1bf1300fad1422f8af2601e593ea388d