Analysis
-
max time kernel
145s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 18:58
Static task
static1
Behavioral task
behavioral1
Sample
4187c5f714fd23aad42e53ebeee5e545_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4187c5f714fd23aad42e53ebeee5e545_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4187c5f714fd23aad42e53ebeee5e545_JaffaCakes118.html
-
Size
26KB
-
MD5
4187c5f714fd23aad42e53ebeee5e545
-
SHA1
f581e71dc23ffe2b481e8db7d26e92aba36c7e18
-
SHA256
db6503825f767737c19cc6aa04a4c268ed31dc55e15030ace8bd9aaa667c3b7d
-
SHA512
ffb66e714ff4d35697dc27b49c67a830bf9c0344a242ed2049338d1f0edbc1a31f308d7b99741769c9db4ada1b60a8eee723d93d11b751ebbc162103e6c22bae
-
SSDEEP
192:uqyP+pKGW8bb5naGnQjxn5Q/hnQieMNnGnQOkEntbLnQTbnRnQOCJVevo7NtjFor:nEQ/1ygc4mur
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3508 msedge.exe 3508 msedge.exe 2924 msedge.exe 2924 msedge.exe 1852 identity_helper.exe 1852 identity_helper.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe 4104 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe 2924 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2924 wrote to memory of 1904 2924 msedge.exe 83 PID 2924 wrote to memory of 1904 2924 msedge.exe 83 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3576 2924 msedge.exe 84 PID 2924 wrote to memory of 3508 2924 msedge.exe 85 PID 2924 wrote to memory of 3508 2924 msedge.exe 85 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86 PID 2924 wrote to memory of 4848 2924 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4187c5f714fd23aad42e53ebeee5e545_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd47b446f8,0x7ffd47b44708,0x7ffd47b447182⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9272265112926820905,7069741441554792428,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,9272265112926820905,7069741441554792428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,9272265112926820905,7069741441554792428,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9272265112926820905,7069741441554792428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:2756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9272265112926820905,7069741441554792428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:3228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9272265112926820905,7069741441554792428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9272265112926820905,7069741441554792428,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9272265112926820905,7069741441554792428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5220 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9272265112926820905,7069741441554792428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4344 /prefetch:12⤵PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9272265112926820905,7069741441554792428,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3388 /prefetch:12⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9272265112926820905,7069741441554792428,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:4800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9272265112926820905,7069741441554792428,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1344
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD560a70462eb4fd572cb4c26251828e5cd
SHA150c05a538d3770891c93d95c42a8d9cd2fe969ee
SHA256c8a6bf3cad4329e8854e519ba395d5b2a69fcb3c733d044b58f77596146a1ef3
SHA512f81118ec80e127600f36d88379ea9dcee47f57d305b50c567a8aa93ef2be22c8da6ddc5ab50cd615bafdb90f0d443ea8d553616a60c3917afefd77290a0a7d32
-
Filesize
6KB
MD5607570d0faa9eed836f27575220e9ccb
SHA1269ec1f4bc71a4d0a7520143d3aa836d535495b6
SHA256d0e4deed8d83426981d50c676b170306543286abc969e1bd4cb00ab45b01f193
SHA512b4d9f40bc658610b9ccf6cbe3e5f72f52b80f4287bdd174c588d3526472c0ab2fa979d2147d42ac33e928a8f41a70fb311056e4e31ffc722c906b9b43909fa71
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59c5a958d4f55b71a30f39fd0493e1271
SHA1938e55f1df42be401c3ef1f6cfbe64518fc2118e
SHA256649ec93a54dfd1f006553cc88d83d975091e4e6a9e10ea6e82bebcf0321f7546
SHA512eae12540a8c3fc756626e4f5d2656900cd94a2291ef1c0b56fa420a8072f432ea1f1cd00bbb49fc39486fcd8b40ce1d569491475f98c1a07fced6fd6f3f34133