Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
3916518d7fd082d07a35d17dbac5ddd2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3916518d7fd082d07a35d17dbac5ddd2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3916518d7fd082d07a35d17dbac5ddd2_JaffaCakes118.html
-
Size
53KB
-
MD5
3916518d7fd082d07a35d17dbac5ddd2
-
SHA1
1fd5e63420af4d209d20c1bdde6312b23fb41a88
-
SHA256
78ac05eabacb6e2bcd4ae68596c1e73ed69fd1ead772fb25792750a528731714
-
SHA512
36903cc8f2ba34c28ac4b524c210a3d0c56d87c495e56ac4fec423e36a6b34fce02e9f8ff08d485e1e18ddd4bfe2f2d8fb2a462f967b4132076a4b8e6f0186ff
-
SSDEEP
1536:CkgUiIakTqGivi+PyUFrunlYd63Nj+q5VyvR0w2AzTICbbco2/t9M/dNwIUTDmDb:CkgUiIakTqGivi+PyUFrunlYd63Nj+qM
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2088 msedge.exe 2088 msedge.exe 2908 msedge.exe 2908 msedge.exe 1600 identity_helper.exe 1600 identity_helper.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe 2704 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe 2908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 5076 2908 msedge.exe 83 PID 2908 wrote to memory of 5076 2908 msedge.exe 83 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 4272 2908 msedge.exe 85 PID 2908 wrote to memory of 2088 2908 msedge.exe 86 PID 2908 wrote to memory of 2088 2908 msedge.exe 86 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87 PID 2908 wrote to memory of 1908 2908 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3916518d7fd082d07a35d17dbac5ddd2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9994646f8,0x7ff999464708,0x7ff9994647182⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:4272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4764 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:3972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5444 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5460 /prefetch:12⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4056 /prefetch:12⤵PID:4308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5788 /prefetch:12⤵PID:4452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1812,15158822708358956793,8668533100321449244,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4844 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4880
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1492
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
6KB
MD57ccc7953566d20938bcef71aab8b8fa3
SHA1043cfd835c72fa50211fba295c10bd37bed697f8
SHA2567e11ae25fae1bdcbb62d51aa9e159655eb15f005ac445f667c8795152d16d04c
SHA512348c9d08ad23b8706fb05136b40e5893c5c7f6a54bdd3c2f6417ad1f2591c53aad9b0973797ae785a0bbb8dc1f49408233813321783fd0e4c2142c622381f71b
-
Filesize
6KB
MD54ab92b7f49fea0af1db4146e8c2e1157
SHA1b96210f205eca6590b757f1d2009ec86d17d03ed
SHA2566feea095d6507f192eecd0e5b02eaf1774e9281f54b80dbb2d030eb2a453e170
SHA512a0e42a2a9c3be79331215a1d1a871b105c34bb2eeef7346f7d2777e0cd313711148fec901275aeed706f0c5929fbb76d687732129fe26f8c524455efc83c7c5a
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5dc11d0305fe66d4bc8f0c059bd53fd78
SHA192890b6c8ce089afc5c4b51573acee9ab03eec18
SHA25620aea82d0b40141b27cf93925b6bc1dd61ec204e668c17b494f770191cd039df
SHA5124dae725d9adeef8853b26676d94b898d80e04cfb1d62b88afd9207579ed53fb9793d57911a95512201c280e51f65ad57444ceea846c643d63ece9e2630912581