Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
3f66a2275bd04f895540d13bb7de21ec_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f66a2275bd04f895540d13bb7de21ec_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
3f66a2275bd04f895540d13bb7de21ec_JaffaCakes118.html
-
Size
139KB
-
MD5
3f66a2275bd04f895540d13bb7de21ec
-
SHA1
de2e2e29fb1e54d02f7413f2f7703d51a0d0a826
-
SHA256
e4e3c83efbbc74af928a2cd5a12ee7ee3b144957159239901f81ff54f627a4b3
-
SHA512
92bd71a7f0f38f72fc588654f962ca828585a060db677717003b96a5dd861e28679f9912c2e0f4b74afdbe0f432c478ef648aaae7372329f81e08ab59b6ec60d
-
SSDEEP
1536:SaRpJCoSG0HlhyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJruH:SaQVGcyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2908 msedge.exe 2908 msedge.exe 384 msedge.exe 384 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe 4836 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 384 msedge.exe 384 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe 384 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 384 wrote to memory of 1968 384 msedge.exe 83 PID 384 wrote to memory of 1968 384 msedge.exe 83 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 820 384 msedge.exe 86 PID 384 wrote to memory of 2908 384 msedge.exe 87 PID 384 wrote to memory of 2908 384 msedge.exe 87 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88 PID 384 wrote to memory of 2424 384 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\3f66a2275bd04f895540d13bb7de21ec_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb566e46f8,0x7ffb566e4708,0x7ffb566e47182⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5552734195268883365,17732390634803321904,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:820
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,5552734195268883365,17732390634803321904,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,5552734195268883365,17732390634803321904,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5552734195268883365,17732390634803321904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,5552734195268883365,17732390634803321904,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:1684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,5552734195268883365,17732390634803321904,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2752 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1056
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3a779e16-96fc-4337-90e6-d986e900eb9f.tmp
Filesize6KB
MD5a5bec360e52a3ca3a3c8c033d983e216
SHA1f2ebf17bcf7588bfe7b0dc3067240b0417389b0c
SHA25681b872bf494f0b75b9a27b6e050ac55fe16ace095d0c0939a2a67cfd5695768f
SHA512d91243172a0dd0ebae1dcfc19509587d5729c093750089ccad28879b291b38be2063ffae59890e4da5521d76006f7237cb1716e4c0016da3d3cecf61c832627a
-
Filesize
6KB
MD51b897cec2e948205fb092ff937682020
SHA115b3a23643c4947abd4e8642e7d956c3c2496ba0
SHA256e346cef74a138610784acad44ea2805c64dff0b29d2b016614fee9c7c4d8e0d2
SHA512f7ef0bf311999b7f4d39a9e3647dddacf2ed8719433b5972a5d6306e8c5667aeec03dc31407e63e9ce555c6784e072318f797287cfb972674589e8f643379743
-
Filesize
10KB
MD573d933b21010df5bbab62791d4190c4b
SHA1a5b216d3b8f3d4d4b62fcafa6ea5f32df527b7f6
SHA256c1e53df2035498758aca7aed994218d1797b07aea92b336e7617cfabe1da8aa6
SHA5120e24bf2aa57e98a9110b2836809d6f6583d7c1e0d9bbc28f72947fccbb9e275eab30ab3cc9337af87cb88faa84c6b0b3da3c95df73302ad431c07ab131ef0e1f