Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 21:54
Static task
static1
Behavioral task
behavioral1
Sample
42478af67ea3a87a144d11eed15ef502_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42478af67ea3a87a144d11eed15ef502_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
42478af67ea3a87a144d11eed15ef502_JaffaCakes118.html
-
Size
7KB
-
MD5
42478af67ea3a87a144d11eed15ef502
-
SHA1
f6536b6f7280b7ac0c785dba9d491381cdcb63ee
-
SHA256
e21a3ccec2f152343eb4fb06d6cf41805d1ddd4ffef0155f302389590272e416
-
SHA512
7b5ffbe78ea38c78d9b1f60b0e0da70fc7d9f112754a42ccbb256e56852409256ef884b0209cbeda7cdc293958bba73c47967bc7f81175f55d7458be93d784e3
-
SSDEEP
192:ln8uqnGDSSW0nqsJfV2/jcgnlPcTghXabG5LXa69JUOhzsXWFRkV:ln8uqnGDnW0qsJfV2/jcgnlP8ghX75zW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3884 msedge.exe 3884 msedge.exe 4356 msedge.exe 4356 msedge.exe 4528 identity_helper.exe 4528 identity_helper.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe 396 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe 4356 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4356 wrote to memory of 4724 4356 msedge.exe 83 PID 4356 wrote to memory of 4724 4356 msedge.exe 83 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 724 4356 msedge.exe 85 PID 4356 wrote to memory of 3884 4356 msedge.exe 86 PID 4356 wrote to memory of 3884 4356 msedge.exe 86 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87 PID 4356 wrote to memory of 3324 4356 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\42478af67ea3a87a144d11eed15ef502_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff837e746f8,0x7ff837e74708,0x7ff837e747182⤵PID:4724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2404 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:82⤵PID:3324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5272 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5268 /prefetch:12⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5740 /prefetch:12⤵PID:2748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4768 /prefetch:12⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,4738786853148617362,13247678199496516429,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1864 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2140
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
6KB
MD5276401ab064b783a8d8d778b9a46543f
SHA14fccdf3021f4e1c5c23632b73f6cb3b12f42c491
SHA256ae39c67eaae86a27be930b02bdd3cbce473d6c06e71bec8cc600ab72d00ff1a1
SHA5125d2e4ab038a3caae85347b3d6f4f386738dcd01ce9a064675c59590a188c6e52257013ad64ae7ef5b916a9b895bb779a2d71661c3ee8f93588d436b5804a2df7
-
Filesize
6KB
MD5fdd0753ef843c30a54547dbaad9aff8e
SHA1d35fb3c4e9eda7768444d798607d575541aea23f
SHA256d9f1a04a84e81c112ecc30214b08f2733db31303e6775fd03780d9ab8f4afd8f
SHA51255f82fd982e276cdb080b28d60539a2c6b550811e69984e4f3dd5e71ccdea9b8cd439e88e34695a6de3d8565b30a2bf992deca14f622faf346c82f9e951233ba
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56b44046d0eb4e33f7ffb7d23d2c66383
SHA17db9bdfc9599c6d5285516eeccea45fee0ef654d
SHA256e0ee15359c9459b55653fbb3a1e443eef30b0f3803c9e8bda90ad94e00b48391
SHA51247e65aa6b490d8b21faa25f617db85dcda7c265c9706bef268788447907935ddfdf5b2d0fbb0a7c7a9f3a3de0ec795ae64bbfb8957fce27d55c28c62fbf94519