Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
429c9e776b3c437eb0c89aadcee08c8d_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
429c9e776b3c437eb0c89aadcee08c8d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
429c9e776b3c437eb0c89aadcee08c8d_JaffaCakes118.html
-
Size
145KB
-
MD5
429c9e776b3c437eb0c89aadcee08c8d
-
SHA1
d0223a3302d6e8cd2e36648d9cb90a11c26d3fd1
-
SHA256
9a279b7b64d6611084e291d1bfcea8d7e36b93a86611ff6bd09073a38f23c20c
-
SHA512
ac72fec586bfa73b7b0adb87139194dc6f47a7bf15df7fab6892ab50439b96707e70e3bca06a9caf9df3b0b7dedf2d40393b84728db4be325605fb392e983d17
-
SSDEEP
3072:Ser8pM4UDx7dyfkMY+BES09JXAnyrZalI+YQ:SeGM3x7osMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2036 msedge.exe 2036 msedge.exe 5072 msedge.exe 5072 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe 848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe 5072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 228 5072 msedge.exe 83 PID 5072 wrote to memory of 228 5072 msedge.exe 83 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 852 5072 msedge.exe 84 PID 5072 wrote to memory of 2036 5072 msedge.exe 85 PID 5072 wrote to memory of 2036 5072 msedge.exe 85 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86 PID 5072 wrote to memory of 3252 5072 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\429c9e776b3c437eb0c89aadcee08c8d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80d7746f8,0x7ff80d774708,0x7ff80d7747182⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13176898384593106242,9798822058306003857,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,13176898384593106242,9798822058306003857,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,13176898384593106242,9798822058306003857,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13176898384593106242,9798822058306003857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,13176898384593106242,9798822058306003857,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3304 /prefetch:12⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,13176898384593106242,9798822058306003857,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2040 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
6KB
MD5f62dc339c9d82deda3b1c13902750874
SHA17899748b0697d9f175e3601c114b351b302be564
SHA256e0286787cb0afff768e615801be0b7bc65cb48785e9faa4e030f8f50eeea4f1c
SHA5126caeee28d820c3ca0d86390d5c58418328fc36638d96d599f58e0379ad894a471c5f0f7f6df3ca9be2730606d1ea0fadda4ccd390541d797cd0b5c024a621d26
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\d00622c9-b0ae-45dd-bfa8-ec85c53b6c4c.tmp
Filesize6KB
MD59da844bfaf6e1ce1434b5c364752ec63
SHA175e46d77290ad5668e2edfb119b4e082857aa175
SHA25635c65ef4a923bf6b354b687a5ded4018f359d7fdb461fe94dae65a4a51812c44
SHA512b3880f8095ba97e210caf378f734bbf0cb8d7cda201cb6171e936dc373cdcba014b15ee65e802c9f0e10b4a1a1764c6e8a80955de0b370d32d5437e62257b35c
-
Filesize
10KB
MD5e4b3b2f36cbe385a15247f635a881ef2
SHA1315ea2ba1a30333ca1a3a83c99ba36e632135b07
SHA256cb535b4b07cfbe61a5bccbb83153bf3f63dc069dc144da8d47ba905a5d8669a9
SHA512aca19bc5ced527ba82220ce6dffef468cd8407fb2ff6822bc540a19f8b89e8213362834b1a3820238a6140c8f8142dee092ce4a418c721a08eb6010258ae2561