Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 13:58
Static task
static1
Behavioral task
behavioral1
Sample
403e35759f0012653220fe2ebfed4cb1_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
403e35759f0012653220fe2ebfed4cb1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
403e35759f0012653220fe2ebfed4cb1_JaffaCakes118.html
-
Size
18KB
-
MD5
403e35759f0012653220fe2ebfed4cb1
-
SHA1
bd800ce6f63bf4cf2a12624ba48af7b9aceb25cb
-
SHA256
d37c371597eaa02dda745eaaab643232550aab69e5b15317e86c464d9883012c
-
SHA512
b1c3348dcff5a5e064e4cad0eae25ffcb1e7f4f0eba5b699ed47b58f3484036e40ec4bb262f97f8a5a44ecbc234c25f3dcf259b3559447ee715f20f1326f46b7
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAIL4DzUnjBhVf82qDB8:SIMd0I5nvHpsvVkxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1864 msedge.exe 1864 msedge.exe 4056 msedge.exe 4056 msedge.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe 4056 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4056 wrote to memory of 2016 4056 msedge.exe 83 PID 4056 wrote to memory of 2016 4056 msedge.exe 83 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 2252 4056 msedge.exe 84 PID 4056 wrote to memory of 1864 4056 msedge.exe 85 PID 4056 wrote to memory of 1864 4056 msedge.exe 85 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86 PID 4056 wrote to memory of 740 4056 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\403e35759f0012653220fe2ebfed4cb1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff267146f8,0x7fff26714708,0x7fff267147182⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4024787434061243167,15741844983718763285,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,4024787434061243167,15741844983718763285,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,4024787434061243167,15741844983718763285,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2716 /prefetch:82⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4024787434061243167,15741844983718763285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:3588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,4024787434061243167,15741844983718763285,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,4024787434061243167,15741844983718763285,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1120 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:856
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
6KB
MD5176d4d5078ba2de892efebabe6942eaf
SHA1b6067b42a7b98852ae12c6cbe4f30bc03110185b
SHA2566729b61447aecb940a60a8867ca92d398e5e4eefb69faf00593b24f1bd6733aa
SHA512e65ab0bb1f6396951648f11e271236fcc98a6ab9e8e8520b0571b4ee40094af0ae65856eeb757e0b804ef8e7ed76badf5e8d16f591738bc8397562726923aed0
-
Filesize
6KB
MD5630b083f0edb451c1adef11842560f81
SHA19aca476fa17c35495347e89fd6372cea4914df79
SHA256a24110f22513235a7fba5d0087ae1de19906625121d088520e20f1f8af47285c
SHA5123973712d68eb0ae1423444f689fb9939cfa161f0c564c60d715e3579362fdb83148c5c1c1b98e355b7bc64b1ee3bc6783431f54177fd1787f2ad4be97ddb26dc
-
Filesize
6KB
MD566c3ad29827fb8ba0d3a83d2b6b716dd
SHA1ad1dd6cee36c519be2c1cf75297720fa426340ff
SHA256e7a82d2825658e0469a6c6b29054ee0d107aa72612cd12cbb9aff1a57f5f7c43
SHA5127fe30385de86da4a0c4a2a8905f83ca2bd29da7cd1e8719d15e01e481b4a0b2874a218f0324e309978b8fc6dbb5de246dfec8e8c781e4e8a0a8485f52ee81284
-
Filesize
10KB
MD5e97896e1cdca666eb78bacc138b9c85e
SHA17d24914d94c9a8788205fb3297b5ffbebae0cea4
SHA2562222aaa3b58b54c8df16401e020f646ab193aafa261379b8ba05955704709bea
SHA512a97258efd4f7d6815521b74cc97749367fe85177d88e8a27d819e32f40a067e51775ee853ea081356b9a2b9ba9b6663c0f9455a56ccbac497428b2f682b5f172