Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 11:13
Static task
static1
Behavioral task
behavioral1
Sample
39b39ce7159d9435c3d3e63cfe3c799c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39b39ce7159d9435c3d3e63cfe3c799c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
39b39ce7159d9435c3d3e63cfe3c799c_JaffaCakes118.html
-
Size
27KB
-
MD5
39b39ce7159d9435c3d3e63cfe3c799c
-
SHA1
fee93b6c751b5ea69813e3bec541e0059646aa76
-
SHA256
b74619a47ed7d16c7752ae44bb34adac2933fc456d8f7b8bc930161a999cbcb9
-
SHA512
ceca8d51d68cf012d4c945219bbac923e9e61c7decf062f8739b713745b5f63bec7cbd969d8e46f7603007458d30d6e1d4723799094a80c637b23865cec985fb
-
SSDEEP
384:Sql6AiZm65sHcwoWbSAP//xVnAO6MTv4KoYKMnA+1qmt6GPFj/I:Sql6j+/S+V1qS7a
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 3884 msedge.exe 3884 msedge.exe 3212 identity_helper.exe 3212 identity_helper.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe 4020 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe 3884 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3884 wrote to memory of 1532 3884 msedge.exe 83 PID 3884 wrote to memory of 1532 3884 msedge.exe 83 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 4624 3884 msedge.exe 84 PID 3884 wrote to memory of 2940 3884 msedge.exe 85 PID 3884 wrote to memory of 2940 3884 msedge.exe 85 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86 PID 3884 wrote to memory of 400 3884 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\39b39ce7159d9435c3d3e63cfe3c799c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8b7e846f8,0x7ff8b7e84708,0x7ff8b7e847182⤵PID:1532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,5561988186123334511,15570379099304780848,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:22⤵PID:4624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2012,5561988186123334511,15570379099304780848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2236 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2012,5561988186123334511,15570379099304780848,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5561988186123334511,15570379099304780848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5561988186123334511,15570379099304780848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,5561988186123334511,15570379099304780848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2640 /prefetch:82⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2012,5561988186123334511,15570379099304780848,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2640 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5561988186123334511,15570379099304780848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6088 /prefetch:12⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5561988186123334511,15570379099304780848,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=180 /prefetch:12⤵PID:704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5561988186123334511,15570379099304780848,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4088 /prefetch:12⤵PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2012,5561988186123334511,15570379099304780848,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3404 /prefetch:12⤵PID:4016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2012,5561988186123334511,15570379099304780848,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
1KB
MD5a819ce389533ba273c1b0f3f10aee2f8
SHA17625065c8cca72b31d960058a4dd8557544c14b8
SHA256601634aa8f261ed464c7daf913d2a319a2170213d69740097a63975e3b6c303d
SHA512fb4effd5571c35f8a03cd87858f77ad572c56643a04be515df58c0055392d2a679877f0b568a6a0c535f55b9b75bc7235ab7c88cd5548f9e724df10000c47b30
-
Filesize
6KB
MD567fc979a381d5845d3256bab188f5cd3
SHA17852b8e37f17afe9a703c84f9bc45867e9008128
SHA256bd198da41bc78835d2b1e6459976ea14c21af839e1fe0517e186c5c1fc2aa7dd
SHA512fdfae2aa90ef2c5582559f053bd8a9c6787e5b82d275e6e025934acc3b389fab8ed5d87a6a82345442b25ea7534634db629c7c82a6d01704a0f58362974f2e2a
-
Filesize
6KB
MD572311f21d310794bb6f0e43d8bb1c08b
SHA169d4a5e0e0455aafbd3351abd6ac53503e86ebd2
SHA2561cd3dfdbf32cca253a8fc89c15137331eca91d9896d9ea5c3edf48dd949edeff
SHA512d7173a67dbc58da3ae6b29b4c595a0f319119bcc767a370d3db1733c6da68a6e254e3655ce23db0e4aedf853e8fa5afa6b9f3682b28a9dde0935ced5eca413d4
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a6cae9fe18b3027abadb97e702afe3d5
SHA19ae96d3db825a2e4013c7b7e1b923708710e5931
SHA25658e4e0cf3f3a9a7d05388616ca8caba7e3642b1495539fc465ab113e723dc427
SHA512cc84f1e6df73a9100f2bf476032d40a1416d4bb9a152345e9cd08c0e861d8157975df9ba9e09407dce4387e61b58995b16beed3a5cbaf3b0ea5449190e62baee