Analysis
-
max time kernel
145s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
403be2a4063b9799ad6b8c32dd8f35ae_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
403be2a4063b9799ad6b8c32dd8f35ae_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
403be2a4063b9799ad6b8c32dd8f35ae_JaffaCakes118.html
-
Size
9KB
-
MD5
403be2a4063b9799ad6b8c32dd8f35ae
-
SHA1
841cc808d2b96d28fbbc161e7a28c2012d4dbee2
-
SHA256
6e2c38079b357ace626e1b62cc927164c00365e07214eb27e7f3570f5d94c7c1
-
SHA512
74e20fb13cc88aee41ca26cec6bbfa3546b1f9c99a0906d03bcf78a7e4f88c13047495d07c496b313ab917089125a9c0bbb717e650dbefe9a4e4ecf61c45a98e
-
SSDEEP
96:uzVs+ux7CjLLY1k9o84d12ef7CSTUQGT/kSxQDxapJO5hslVHcEZ7ru7f:csz7CjAYS/RSWWoEPHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1124 msedge.exe 1124 msedge.exe 468 msedge.exe 468 msedge.exe 4540 identity_helper.exe 4540 identity_helper.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe 3232 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe 468 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 468 wrote to memory of 316 468 msedge.exe 83 PID 468 wrote to memory of 316 468 msedge.exe 83 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1752 468 msedge.exe 84 PID 468 wrote to memory of 1124 468 msedge.exe 85 PID 468 wrote to memory of 1124 468 msedge.exe 85 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86 PID 468 wrote to memory of 4736 468 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\403be2a4063b9799ad6b8c32dd8f35ae_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffafe1146f8,0x7ffafe114708,0x7ffafe1147182⤵PID:316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10526022991620250786,5646188574149922788,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:1752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,10526022991620250786,5646188574149922788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2184 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,10526022991620250786,5646188574149922788,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:4736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10526022991620250786,5646188574149922788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10526022991620250786,5646188574149922788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10526022991620250786,5646188574149922788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2108,10526022991620250786,5646188574149922788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5108 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10526022991620250786,5646188574149922788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10526022991620250786,5646188574149922788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:1096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10526022991620250786,5646188574149922788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3368 /prefetch:12⤵PID:4384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,10526022991620250786,5646188574149922788,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:4424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,10526022991620250786,5646188574149922788,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5208 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3232
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD54d098d05a7a22084c62462546503b4aa
SHA1ffe1081ce7a41d373aadab7745c101fc4f91a8b2
SHA25690cbbde3531ef7bacf86d494755128d9188d6e3f32103779641bf91a87661b42
SHA512ed247d9454586fef15038304e955fc5d38591b64d1f4a9f11e7394c8bdc860281aa44acd39360d39dbe030a9807de94c333f4aef899349651b49d15aae3eb381
-
Filesize
6KB
MD5ce53a9cdb4b4e65b2553606638d26e15
SHA19db7ad083a83a8e099bc92d9b69ded6f0f17ccc4
SHA2566ea0b6daca87251e220965900d84482926b8cd9abf4c51d85adbaeb8cf8ef680
SHA51289e4c07d6b6ac69dd3a37933478ddfe791664cc8aa6e180cb94d1ece1b1dd7efe49a0247640fa427af96b24ba947aec6e260399b294a59236f9159d20113bbcc
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50fd167116d651047e9ff208d71e5ced2
SHA1f4d39d144c7b1722539c97a6982cc0d9702abebf
SHA256ebbfd4ef20e8f03d746242405c6e8d41d45baf5523d92a80ab9e8bb1b31b91b0
SHA5124762827e6574116bb3c1b5d59e9d858f639887d0f2ff601e23f7f7b8202d561dc8f503289164583141e8e77a14f8380de750092656dd9c6d9c49b652c061ac1c