Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
412d1312f7daa7c8e4be2b39c413c67d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
412d1312f7daa7c8e4be2b39c413c67d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
412d1312f7daa7c8e4be2b39c413c67d_JaffaCakes118.html
-
Size
139KB
-
MD5
412d1312f7daa7c8e4be2b39c413c67d
-
SHA1
aab82dd9294c31ff55eb380e9228a062bec702a3
-
SHA256
50ed93befa1f9ef8d2fe2c831de83ae2cbf5f68b7710148af069e7c5000d8b25
-
SHA512
ddc1d0566b4899509c59cf8779a174cc46e278ee9841fc53a7edc21b8bc34487a0ec9a6f4851c4193273ef40a96f17ba7944ed630c1705b210840d2563a2c99b
-
SSDEEP
1536:SUWvkIxcZW+MllGyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:SUW/GyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1544 msedge.exe 1544 msedge.exe 1092 msedge.exe 1092 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe 4480 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe 1092 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1092 wrote to memory of 4636 1092 msedge.exe 85 PID 1092 wrote to memory of 4636 1092 msedge.exe 85 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 3168 1092 msedge.exe 86 PID 1092 wrote to memory of 1544 1092 msedge.exe 87 PID 1092 wrote to memory of 1544 1092 msedge.exe 87 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88 PID 1092 wrote to memory of 1264 1092 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\412d1312f7daa7c8e4be2b39c413c67d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdce0346f8,0x7ffdce034708,0x7ffdce0347182⤵PID:4636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,12522773501211850750,9416289127964509399,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2172,12522773501211850750,9416289127964509399,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2172,12522773501211850750,9416289127964509399,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2832 /prefetch:82⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12522773501211850750,9416289127964509399,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2172,12522773501211850750,9416289127964509399,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2172,12522773501211850750,9416289127964509399,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1708 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5016
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
476B
MD5eb4e238c4dd131a39ae13760e282e9bc
SHA11c2ed713288f5827ee617edad91d10c7f1b3dbec
SHA25685011c3862937e3ee0ab95f3ac8e5ce8a2d09ee73113255d01e359f55b79c754
SHA512a664a4a73f14c14eba4d8926dae74bc9d902b02ed60f0e3b736ca1a272c7c45861346dbcd9aca52cda6997fe02ff5262d13b15d31b3539a907bf8d2f78abe767
-
Filesize
6KB
MD5bfd4e2b35fa8d5f06e44351130560124
SHA14b49ffb993825be79323ca99e838d9395bb357a6
SHA2565e71642e583cc5700a7da7433221d0412fb3d7b0a16ce28f2c8b4eb72933d3c5
SHA51222b168c0279efc6b6a82b6e88216f561a064af74c0213a11e2f7f7d21b53f03492d366ead478b6b1a82eaa5aae0b094c49a72a56d138dc013808b0e35c869735
-
Filesize
6KB
MD5aeae90aef4c0eb74abbfd462809f73cb
SHA1bede67d4654e2de0be68a85997679e21b3ba918e
SHA2561ac97fa66ea8a97f3f7b73c6b87e3fde10a4d9039ffda53ccd389938cf322a68
SHA51203b0301bab26e64a1853639617baf278612bb59d6589afbca64e0dab0749e5afa00b9b0b893e6f599a1203acd3d80b510b87dfe966dd2eb5b6f0f94aea447e5b
-
Filesize
10KB
MD5999353611dafb7b629cbf61a9dd5419d
SHA13017e8fbbfc7d21d1869a5b62b47b868f820230d
SHA256cbe8daa4ec3549f61f20c5110316bcad6ae57ae99b72a5a9259b3962c6bd52f0
SHA512c58482e0035fc32c4e5b58c65068f572cf8d9a4f35a0a451732bbbff6bc01aa9238a9b0187638cb845cf91d0ddcd889234734e7753681d5dc2cc2edc82544898