Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2024 09:14
Static task
static1
Behavioral task
behavioral1
Sample
3f024070d33c9623315e65f0ac003174_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f024070d33c9623315e65f0ac003174_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f024070d33c9623315e65f0ac003174_JaffaCakes118.html
-
Size
33KB
-
MD5
3f024070d33c9623315e65f0ac003174
-
SHA1
4fca5794bd3c135b086e90276a14507cd327ba30
-
SHA256
d37e1d10bfc2eb9751ae26e4e1ea275bcdaa0020826f0b5893d56f5969c9687a
-
SHA512
9c1e93d51aee0cf1c10ba448ceeda8fac62ab04d453735c76ae4b77fcc802d819f10e0d2ca2b347a63f42df49b3dd97eb2f4e2adda24f95c0b08edb8d8397eeb
-
SSDEEP
768:SGIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqIRIOITIwIgIiKZgNDfIwIGI5IVJ7SZNt:LIRIOITIwIgIiKZgNDfIwIGI5IVJ7SqU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3208 msedge.exe 3208 msedge.exe 5012 msedge.exe 5012 msedge.exe 4048 identity_helper.exe 4048 identity_helper.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe 3904 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe 5012 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5012 wrote to memory of 3740 5012 msedge.exe 85 PID 5012 wrote to memory of 3740 5012 msedge.exe 85 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 4420 5012 msedge.exe 86 PID 5012 wrote to memory of 3208 5012 msedge.exe 87 PID 5012 wrote to memory of 3208 5012 msedge.exe 87 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88 PID 5012 wrote to memory of 3024 5012 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3f024070d33c9623315e65f0ac003174_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cde346f8,0x7ff8cde34708,0x7ff8cde347182⤵PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14081526470197273718,1976513671703017257,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:4420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,14081526470197273718,1976513671703017257,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,14081526470197273718,1976513671703017257,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14081526470197273718,1976513671703017257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14081526470197273718,1976513671703017257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14081526470197273718,1976513671703017257,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4200 /prefetch:82⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2100,14081526470197273718,1976513671703017257,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4200 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14081526470197273718,1976513671703017257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4760 /prefetch:12⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14081526470197273718,1976513671703017257,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14081526470197273718,1976513671703017257,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3604 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,14081526470197273718,1976513671703017257,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5940 /prefetch:12⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,14081526470197273718,1976513671703017257,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3904
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2520
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
463B
MD599f5e38dceb154c62467c8b7d166064a
SHA14f9762db434b27bfe88e821689e990ea475244f7
SHA25625b5c0b5424cdd9ca114c736cef40592b0657b718e426c94c57d12c5f6f78cf5
SHA512f5476a6d3e505ebeb4950a66805e738169d8501749de42b96d1674c712df789094323578d08e17f45d861ceffbad479297611fe149b3f7ea2654152e48f5a601
-
Filesize
6KB
MD5c3051799a071eb1891f8166bbc75e922
SHA11418e0d2ae2c13deb11ca55804a76f227bc420b3
SHA256f3016642bce87702ecd833d03e2125e465187308a6561f4ace2eacd761587121
SHA5123030a9941ebce7681132950419866fc04d7710c63339fe2c1ebe8cc66ab73b98dee49a058bccfeb1bd8deb8886eb9cca23f00d7ce229e1fe4d3cbcaa1507e2b7
-
Filesize
6KB
MD5fa9eee2af4d5aff78be54a57deea60da
SHA1e86500db8fa1a965bc0cce9ce3b0966d0f35e802
SHA256cc99401a51d4f66f8e58190c6c6455597beca09011037e3f919547d2936ae03f
SHA5126bd8be0b67e3a64f901f6a44870342456c5272f205085eb54c4be01f1119e96a619328424830287a0698865f29533af6294ce8c5e48f8a6fa719f581f6ea6ad8
-
Filesize
6KB
MD5533701a5aff9071c5ba273a500341f00
SHA1002eae5d76188be763b0a21e4ae77b8a2721357e
SHA2561099e4028efb6a33b8f4dcf3f29d2be31e0a1b5cf3ad6032ee5db4e01e6aaaf1
SHA5122be0dd074e85328645008ba7e34c060f6a22aa3e2eb0afc009474c5a6a887838c2bd0995e00784ac74b3fb834626b9f843be7a77b1f75a7c10741bfc3ce2d43f
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5f201d30238af4510f71b5e7996c0edc5
SHA1897c7af6836ff7a55d3bee1bd5cef3d6487c4ec4
SHA2564fa229e1c4747061452426dbef480ce4c3976de5d2b06c67109a24c058e37541
SHA512e6176c2b530d01b0142c407bc4b54c7bab1dfa712ef956080f1ee15ffdd59866034b5bbe9cfa9f2b56db1c0848bc6f1fe91a097b12fc50a7100d3f8d42c24da4