Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
3b27e54f9a50f1676741f6535a023389_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3b27e54f9a50f1676741f6535a023389_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3b27e54f9a50f1676741f6535a023389_JaffaCakes118.html
-
Size
139KB
-
MD5
3b27e54f9a50f1676741f6535a023389
-
SHA1
80db2b255d984d6f2116e445a982ecfeed90f9c2
-
SHA256
231d5ce5c7a8e5b22e1783a63d872981a59de0eda80c5b4adbcd399579587cd5
-
SHA512
7ceb1daaaebb1f11da1f1e7f39c8d519595d70cc0d391de2e85876fbc99945166230ccdcd289a05e940c3a7dd642c7244a1d65ea1c886047537caa916f5cf8bb
-
SSDEEP
1536:SMN9tOpDYfhZizrYF5lUZtyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09M:SML+yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3672 msedge.exe 3672 msedge.exe 772 msedge.exe 772 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe 1564 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 772 msedge.exe 772 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe 772 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 772 wrote to memory of 2564 772 msedge.exe 83 PID 772 wrote to memory of 2564 772 msedge.exe 83 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 1356 772 msedge.exe 84 PID 772 wrote to memory of 3672 772 msedge.exe 85 PID 772 wrote to memory of 3672 772 msedge.exe 85 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86 PID 772 wrote to memory of 4720 772 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3b27e54f9a50f1676741f6535a023389_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff38e146f8,0x7fff38e14708,0x7fff38e147182⤵PID:2564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1772,7708280187217083371,11640170839878289671,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:1356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1772,7708280187217083371,11640170839878289671,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1772,7708280187217083371,11640170839878289671,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2744 /prefetch:82⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7708280187217083371,11640170839878289671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1772,7708280187217083371,11640170839878289671,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1772,7708280187217083371,11640170839878289671,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4956 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1564
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
6KB
MD504ac21ce3fc3a04eb41fc4ab00bb35e6
SHA1bfa844664299562ee0bdccae520e9a8f8c88d5d0
SHA2565a021b96584b68214cab16662d85b4889178c55c5c23946bb4629303dde577bc
SHA5123314c8188030bcd0f87bd82afdbbdb6325a37becb33187ba90fc82b165ee2b3e073b3b7d84e246a934c79abdd1f9e7220b823a028b944af9d8208daf61ac9821
-
Filesize
6KB
MD5047893a710ffef923aa5671cf2c87661
SHA15e7d5dac25ce9132e204d8709348f464740fa1e0
SHA25612df5b6850b3bfde36fb70de7083f5ea6aeb7166fe42bd6e3c953d825f26abdf
SHA512612b04464b27750b00ac49bd0f9050ccde20d6468feea0bce3009aed4dd3d33c1fa6ff0b2d639eeab56d0ef103adb5b038ccb99ee0d8829ec19ac056cc0dd15f
-
Filesize
10KB
MD5ae87161e72a77ca7c3dcb02501fa26c1
SHA1ddb82a244fbee2c8cc564f515e0e0d1052a7bbe4
SHA256a7b89962f11605c9aca1f2cee255b2822d0832b76413f963b6e66b5817c63c3a
SHA512d90862b76c06e56964330ac26e18425883101281ea4720bb4b04d76a86bcf4490e5df4ba8a5c2b4ff6d259e7552c15eec9883528eaa4c6a84d224a6fa3c22c2a