Analysis
-
max time kernel
145s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 14:15
Static task
static1
Behavioral task
behavioral1
Sample
42ac1d73c0163dd2682f457e1e8a22fe_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
42ac1d73c0163dd2682f457e1e8a22fe_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
42ac1d73c0163dd2682f457e1e8a22fe_JaffaCakes118.html
-
Size
53KB
-
MD5
42ac1d73c0163dd2682f457e1e8a22fe
-
SHA1
a942f133433f9175a65c18d195ee333a2e4065ca
-
SHA256
02b79ecf3fcb5c3487c1d12452e52ecd87b04005516583f4cd00b8bc73bf9053
-
SHA512
32cb0925c3e3e420f8213de28e998db6cde2b85b9f12bdceb2000fa4d92ab0c3dc3ccaee35d480157d8c99302f82bc63a3854862ae6c93ed385ec4c2b711f746
-
SSDEEP
1536:25c9qJTl62V3Fh8HTG/q9WB0GI8buqdiOmni5QdiUzD5cyOVfsuBiz:25c9qJTl62V3Ykq9WB0GvbuqdiOmniKP
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1696 msedge.exe 1696 msedge.exe 1940 msedge.exe 1940 msedge.exe 3472 identity_helper.exe 3472 identity_helper.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe 820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe 1940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 384 1940 msedge.exe 83 PID 1940 wrote to memory of 384 1940 msedge.exe 83 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 2872 1940 msedge.exe 84 PID 1940 wrote to memory of 1696 1940 msedge.exe 85 PID 1940 wrote to memory of 1696 1940 msedge.exe 85 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86 PID 1940 wrote to memory of 3728 1940 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\42ac1d73c0163dd2682f457e1e8a22fe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc0a8746f8,0x7ffc0a874708,0x7ffc0a8747182⤵PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:3096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5376 /prefetch:12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6004 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6012 /prefetch:12⤵PID:2324
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5780 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2428 /prefetch:12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,6520030426697966021,13770593030880227389,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4908 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1992
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2340
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
1020B
MD5f1615a5bebd57973b796401ef4b00cd5
SHA16bb1ffbbfba3037ffd9dddaee23398c5816c87d5
SHA2561bd1192bf164ed1e50da19c3dc172719c05b472bdf170f20f94b3d799db18150
SHA5129274df67d0f29e36c22fd59b7158e76ee5066ee60412eadfb8637eca9981112e1b4a5366ff5ab9c42b80de9f97fafd3eef0360ba79a86c197e448e5f46f9ae68
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
6KB
MD5480a702457c65ff24966a07d747444b4
SHA19f9ee973e6e466bfdba8b91134338d8a6b974ef1
SHA25620b4af7d7847f356e7e4bf35d17c0486d5b1602643ee3b10eb0586d796678cfa
SHA51267b443846d85c8f03e2ac528e2d5a7a72fe2ea4e2e17d28cd81a67237cd08f8d7787d8fcaf4071ad4800b2c8cd408d75183980118a4e0fbdc664c7f26697972e
-
Filesize
7KB
MD5454c2c1f5650adc805fbe3efe917dda5
SHA1219831446768b3410002f02a70d93b471d753af5
SHA256812e78a5a7bf9b1520bdc605679c31fb21e010f4e02ab4b7e83e328394307733
SHA512892e00997d9c6f1f709192c31a332c809fca5c3f3dab011828578b1310accccb8028fed371289dbd62c472bfcd70ce7e65a6e3d7c2d8426971884d0bfab6bb9c
-
Filesize
7KB
MD54254c3c4fe9c7b7f4f2f88d2b843c05e
SHA105a533095e0eaeaa80c1f7334fc7920d1710cd60
SHA2561d727b30a3d426ab8ee9751f32a56cefc083b986ce7e992e29cf79a03d13d44b
SHA512c0d38b55c0449155558fa6b82f43d52a65389902766025c9e387e5196efa2d5f359078db1b9ce597f06ee80d55e73cdf52ce8e01a25cdb2b48c41ba3203af0e5
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58f3384ae3642f84446214b50525a7ad0
SHA11292a9e4af42c34322f792091e138e5f587a294a
SHA256e92d2e64b598cb82c9f1466710be3ac33437e4d7ae3c978eca093fcb9d44fc48
SHA512fc34840af6682c14d9b01ee442a50197a6dedd679c78a2ce38fbff6782662a7bf77036236ebfb1c70cd7a8b59aaf52f82343feacb725857825deed01f29bc668