Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 16:16
Static task
static1
Behavioral task
behavioral1
Sample
40d66d4db60b443808c9086f2759ab4e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40d66d4db60b443808c9086f2759ab4e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
40d66d4db60b443808c9086f2759ab4e_JaffaCakes118.html
-
Size
16KB
-
MD5
40d66d4db60b443808c9086f2759ab4e
-
SHA1
8af1471b4a57e62598ea387bf47db1ffef35ca9e
-
SHA256
e4afcf2eed16b3bd5788d96ceeb64a9d1da2c85698db14b95dabf97d2028fa9e
-
SHA512
2f25491f8d355ac1677eed76f2b55bcadd8778b9bb8ae01a6c6f09b9009ba0a8a16d60646afc2a9f66bfe9781a1ff7c9d4b66e349c2673db1cadb129f42dbb2f
-
SSDEEP
192:fyEyDL552DJyjXIRKDvo/nymbj0bM5rdNVgWurT2F8ILl1x1Tg:fUL5QDUFIjEc8b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 924 msedge.exe 924 msedge.exe 1820 msedge.exe 1820 msedge.exe 4368 identity_helper.exe 4368 identity_helper.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe 1088 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2380 1820 msedge.exe 83 PID 1820 wrote to memory of 2380 1820 msedge.exe 83 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 2464 1820 msedge.exe 84 PID 1820 wrote to memory of 924 1820 msedge.exe 85 PID 1820 wrote to memory of 924 1820 msedge.exe 85 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86 PID 1820 wrote to memory of 4428 1820 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\40d66d4db60b443808c9086f2759ab4e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x108,0x10c,0x110,0xd8,0x114,0x7ffc2ee246f8,0x7ffc2ee24708,0x7ffc2ee247182⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:2464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2276 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2932 /prefetch:82⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4188 /prefetch:12⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:1152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5492 /prefetch:12⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5512 /prefetch:12⤵PID:4076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5656 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5724 /prefetch:12⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1964,11101706191536604832,16600174467715033670,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:508
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD5b6dc3d00852e69162466afc4f8b0159e
SHA1c2ff37e347b87433eb7759a8f01a9734b2028b6a
SHA256e5df88f550e2fbac311184d7fc658f3594a1190460fa1fe2a8ba0e070b4486a3
SHA512ed074efde814c6f6a50359c9137c81c5b5c8d5a55a2461f6eab71a24faf60b1869ad5b20d301fd7c55d4f18cd14b5b9b260d64f934ee9c7f9c92d909889e51a9
-
Filesize
6KB
MD55efa0afec29455ddbf321b8e340b45e0
SHA1e852034ae00dcadc5e0f040d28e577a4bac9590b
SHA256eadae065891338d1f8b89e2151c1b8e8daf1c24c1a0e2c4f8cfcb45957c31ecf
SHA512df702cfe06c2fda02112a80778beb56c6d4a232be4cacf6bd85ab94e78fda70131220a84f69ad3a5787cebb31920c2e8d70935d69f09d93ebcd5fc1e7a4be637
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD555d84245a0fece120cb8a767ce61c4c5
SHA1adca2184a968e4825ac04bd22f72873eb3dcbbc5
SHA2563ed47f152e0cc76679d9504898f1e1e25d2e398f04ecbb45141e9f2f39b96aa0
SHA5122d37f3073fa7d95107b6b7e2d1c35fd0228198b99622b54ec522ea6c7fb46e4a449697ad1169fb742941c917eee69eeab53a531e2acdecb762126f8035021c39