Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 10:58
Static task
static1
Behavioral task
behavioral1
Sample
39a53ad1e3fde5ac6c488481ec201a62_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39a53ad1e3fde5ac6c488481ec201a62_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39a53ad1e3fde5ac6c488481ec201a62_JaffaCakes118.html
-
Size
96KB
-
MD5
39a53ad1e3fde5ac6c488481ec201a62
-
SHA1
a41fb0fda9e9afcbb9c86a61e76742548aff9417
-
SHA256
7302ea6fe00712db7d22fffec783dbcbc14e013144f5be79fef610ab868946d6
-
SHA512
16add1458f9b1b24f9f129ee61178176d1f449e592f3fe7f10d955761dbe732cc3d747b1da5a7d8c4e6d9002c1d3a4c2e5b3160a6c971a01c2460b91c5f153ad
-
SSDEEP
1536:mbMlQdeiY1EQhff/4o/4eaWLoLmTtWAcmId+kcHdTrY+m53jCDQiBxUHJZUVrkqU:mbMlQdeiY1EQhffuWLooYhOWJJ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 920 msedge.exe 920 msedge.exe 2556 msedge.exe 2556 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe 3868 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe 2556 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2556 wrote to memory of 3940 2556 msedge.exe 83 PID 2556 wrote to memory of 3940 2556 msedge.exe 83 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 1100 2556 msedge.exe 84 PID 2556 wrote to memory of 920 2556 msedge.exe 85 PID 2556 wrote to memory of 920 2556 msedge.exe 85 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86 PID 2556 wrote to memory of 3124 2556 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\39a53ad1e3fde5ac6c488481ec201a62_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe241846f8,0x7ffe24184708,0x7ffe241847182⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,7199816655411735612,3181834534536050297,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,7199816655411735612,3181834534536050297,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2176 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,7199816655411735612,3181834534536050297,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7199816655411735612,3181834534536050297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7199816655411735612,3181834534536050297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,7199816655411735612,3181834534536050297,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4896 /prefetch:12⤵PID:3780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,7199816655411735612,3181834534536050297,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3868
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1060
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
6KB
MD5f12ec3edaf91aee6c25420a84baa9900
SHA11b5758c2226e274affb92b715f2d0ebc1f140761
SHA256d85dc711cca2f98a2c6457d954b7f6e0c27da0feaa8929f35b79d1479df9c03a
SHA51226adf81ffa0301cc112234cb0b2299bf48f9a9b4c5efa977d0f0ed29180b827f84a883f1a7c49e0e64ef10ab99e5e40e66ed8c7f4e92d14af97dc05507e98a26
-
Filesize
6KB
MD5f3e8897df7201249468d2218de222229
SHA16139e37c92f445e3c3bc2a6f3b33bbc43bdd5ad5
SHA256680742093fae88b95776c476b7f6c6236865f5d93ff6cf506fd39dd66232fd05
SHA5123008275d7e18f5e7b541e13d14d0a3236638a105d496bb8547a9620c3a37be8f0b6c7f6487079c1991c1c8b6c8a275af8c07933a4cb6b32e7ccf1250331650d4
-
Filesize
6KB
MD5068c1f6b1dafac8d3407cc26a220dd35
SHA1f829e72f5bc5ec7203160b9f217be4df53bf4e35
SHA256c49aadcec9dce2a031de008896fdd2d85fc5cdb6afaa4b232a720c2b6f805ad9
SHA5120faf219cc7a1b952b6cd3823a9c53ef4abad7ce011491c8d495bd4829b7a7ae52e4f2fb5b119129780ff06598f2f3bd84b2c7116e5bdbfee4fa4f81ff1e343ad
-
Filesize
10KB
MD59d84ad8f151aff971665a8a801bf90da
SHA1827c9b7de8eeea08b298101327e69aca38536d99
SHA25639fbd217289c988b4be6108ef4d7cb56afc1bff5c173f9934c7083121f29f175
SHA512d9ba574cbe998a97611588886103ad63faa27aba0d25277cba940c1e408ef30d468f6b66e47899f4bbd8f554eff68ef35ad4bec6bbf815b5cfe20ad0fb123102