Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
368b2a1393598e0cafe654af8127ff33_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
368b2a1393598e0cafe654af8127ff33_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
368b2a1393598e0cafe654af8127ff33_JaffaCakes118.html
-
Size
37KB
-
MD5
368b2a1393598e0cafe654af8127ff33
-
SHA1
f0d919518dc820ac7e61517a973c3a4bc6765e4e
-
SHA256
1d4d91771c578cfbfd6e8ca28f3cce32b94c910364a1d1a100114f6894d42fa3
-
SHA512
af60b1dd84ccabc2f08751e3a85f85bf6245bfa923f178ef23fe61c86f4810fb3a4ef9bc4120627c9b92ab5c4cabc93ea40d14881fb4a114ba9ba87715f00726
-
SSDEEP
768:jz8d1oaz7LjIvLCJCr5KZXVHZVLhsotb5mAdXbLR:jbaz7LjIjKo5OFH3LhsotbDdXbLR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3164 msedge.exe 3164 msedge.exe 1920 msedge.exe 1920 msedge.exe 1492 identity_helper.exe 1492 identity_helper.exe 516 msedge.exe 516 msedge.exe 516 msedge.exe 516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe 1920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1920 wrote to memory of 1512 1920 msedge.exe 83 PID 1920 wrote to memory of 1512 1920 msedge.exe 83 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 4136 1920 msedge.exe 87 PID 1920 wrote to memory of 3164 1920 msedge.exe 88 PID 1920 wrote to memory of 3164 1920 msedge.exe 88 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89 PID 1920 wrote to memory of 840 1920 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\368b2a1393598e0cafe654af8127ff33_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff994ef46f8,0x7ff994ef4708,0x7ff994ef47182⤵PID:1512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,10839986942920021033,15362988887531012375,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2160 /prefetch:22⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,10839986942920021033,15362988887531012375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,10839986942920021033,15362988887531012375,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10839986942920021033,15362988887531012375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2172 /prefetch:12⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10839986942920021033,15362988887531012375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,10839986942920021033,15362988887531012375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵PID:4960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2144,10839986942920021033,15362988887531012375,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10839986942920021033,15362988887531012375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4664 /prefetch:12⤵PID:1472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10839986942920021033,15362988887531012375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10839986942920021033,15362988887531012375,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3716 /prefetch:12⤵PID:2688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,10839986942920021033,15362988887531012375,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5388 /prefetch:12⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,10839986942920021033,15362988887531012375,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4680 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
477B
MD526b811ce61c531fd944a61a829a092ad
SHA1a9469c82de0a8fba67a690cbb8a5af73696b9e5e
SHA2562fce7055a6f86f453b4cd998d18623f66112a8e4d7ad5bf545d48472fffa895f
SHA5123c70e9988a6093c73ae3cba070348dec18b248ea898a3154fa1e74566a86a59add0b56b046a9cb23c625f11140888b97327f6c39126286b00c79c2eac39e002f
-
Filesize
6KB
MD5c3514f44f0555f92c557ed3a744239c4
SHA1fa60a4bb963891cff091c6b2b0aa51d139bb7e86
SHA2564c6014f069dff1ebcca2a414e1f47093be99a0c9a2ab18cce584ef6aba02fcc1
SHA512780a51418fb351bb10100977dac796b0edcb81b5eddb4d5ac4c156a5a9a7cfa90acaff95cbe7cce9f22eae70b54b63ce6359f07b02b5d864a5fbc7c1fb61f592
-
Filesize
6KB
MD5d78c12239086ab6bd4182692069db8be
SHA14be5395acafe2917a671bf6a2e33c76a13cfbeb1
SHA25617e8f90063b22876c5e8896e1836c430107cc34a3fdfcdfe415d41bb3608de7e
SHA512c0ce3daa31fc00139abb4b884ac83928c27d479c3ada1a177e2e686b012d7be1125233b254443dad2c83612bb61aefde0b17a1e7d0e9ecda863c958e4028cd14
-
Filesize
6KB
MD59c2f2e2d7c9c992f8a4b2211fd859cd3
SHA19549d05084ef4fe4a6712a8b346911068a7d4b10
SHA25617738646011cf4dfd04b2fc2fac70d1f0d320356767db56049d1634d8f8ea7d1
SHA51278468dad22614798b81779d530cbc0cc411354299463b80ed29a84ef2de4e0a40afcdc73db3e92a476aa9bcb7f40045d1e2a549cdd2fd1a23f7583f17fa26f9b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD51bb6674ecbadd3c35fb5e142f5f88f77
SHA1764345656a4a2530860b020694abb9bf710df7d7
SHA25616519fd864d1d916fac9530367be09ad761e6cfcc69aea98f3d66402e8cf7456
SHA5123e7ffd7d55faeddc4dd43034afd05d81b7b4c8f3386e6ddae593a44b6b87cde7bf2b8ca7b013a801ddc87d7347f9765aad9ef648f6d87ff03d1a4bc7326339ff