Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
446706ee009fd4c8daede6aff68422dd_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
446706ee009fd4c8daede6aff68422dd_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
446706ee009fd4c8daede6aff68422dd_JaffaCakes118.html
-
Size
101KB
-
MD5
446706ee009fd4c8daede6aff68422dd
-
SHA1
23f745dd3643aefcbdcc9ed20f1f864001ba03a4
-
SHA256
6e568bc686f9b226dc1dad721b4da216e18b258b6428e6688da5219304cd1bb5
-
SHA512
bff98eac3b04aba1c19e7bd41afc1fc957f3e79ea879b75ab3ba8c023b5b90c79cd8cfdfc4e171ef8f1ce475ac82beb07e92bd3e5474bef6e92b4da05be55f05
-
SSDEEP
3072:Sx2DvYU3yZM6NkauLwJsjTWh3Qt7X6+JU0agbcabqAX:SJCqAX
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 4920 msedge.exe 4920 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe 3200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe 4920 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 3508 4920 msedge.exe 85 PID 4920 wrote to memory of 3508 4920 msedge.exe 85 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 2028 4920 msedge.exe 86 PID 4920 wrote to memory of 3316 4920 msedge.exe 87 PID 4920 wrote to memory of 3316 4920 msedge.exe 87 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88 PID 4920 wrote to memory of 3524 4920 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\446706ee009fd4c8daede6aff68422dd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffeffe546f8,0x7ffeffe54708,0x7ffeffe547182⤵PID:3508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,17361201938879785470,17781043816432455218,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,17361201938879785470,17781043816432455218,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2264 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,17361201938879785470,17781043816432455218,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,17361201938879785470,17781043816432455218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,17361201938879785470,17781043816432455218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,17361201938879785470,17781043816432455218,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1756 /prefetch:12⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,17361201938879785470,17781043816432455218,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2996 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:836
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
408B
MD5b236fcd700cd36179597982c668a9e2f
SHA12cc8b8ffdb4768b07307455acb301257e465889b
SHA25673b6a940602b62b546e7d11ce976287864f7f6bbabdf68b8e3e4e5fb3a81b97c
SHA512c0d22772677c0f3d8d87e93ccfedbd7d60da3156a7aa59b6a69414249b304e5c7e3742322677d26fd0667086ea09484ff56c00b855052b40dc0a43f45320a0f3
-
Filesize
6KB
MD5948511b857ae177324aa95657eb01fda
SHA17bc5716ede11b331c8e93a190e62ce7e581b8a3b
SHA256b604b66c9c608755c12d3660053d333566c6a9f2e6471bd8965e7ce76a1fa059
SHA512add0eb699515dad1ea647364577f9b820a7be177f5c7ca724ba3dfcc70012bfd0d7f421edd20f8bf593bca27edcc351c310c3b13f6a36f4acafa610a5281cd69
-
Filesize
6KB
MD50770ec71a414b1187b81879c0f189f41
SHA14f8df21cdf6ede57b4d0da4461fef3d32fe3c29c
SHA2569e94ba4e1769a54682ce2cb60719b8db331612bb84eba1d0c0d707b0bccab12d
SHA512878fb647d9c8084be7f6b3223da13a002d528ccbd51a9dc497b5b0adb5ae99b9413ff856b252ea749de81222c268d0460e14b36fac8b2eb0154a9aca69041f71
-
Filesize
10KB
MD59bf24a6de46eaabfdc48db3fe8773482
SHA1e525b942b50f5afa3052cff426da06b3481d0e62
SHA256838411ffe0cde21d13958a1ab292ef4588aa1fc470231c619f66b7338131ad72
SHA51220a4dc5dfc48c5f49c133f0c7f7d2e6715def0a9266ea1de12268f7facadfe192aa1f8a35ace7d3468abd095c525e04399d7f9bc78dda8c2835dab273c4d2ba0