Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 17:08
Static task
static1
Behavioral task
behavioral1
Sample
434459a2ee2379c3369985a5a3ee4f2c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
434459a2ee2379c3369985a5a3ee4f2c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
434459a2ee2379c3369985a5a3ee4f2c_JaffaCakes118.html
-
Size
21KB
-
MD5
434459a2ee2379c3369985a5a3ee4f2c
-
SHA1
c169930cad308de5bbc233b288034a9386c9aac1
-
SHA256
b640a65ec8d4a9c711447b897bd1b3b6ffa5ca349cc60115357b37e36e082b86
-
SHA512
5e5e03ba3bcc40d9155de70d2c69a348fb25506c08c50d4c992386c7743cb275a1e40cb03846124aa8690763d04797a5d4ff9e98fa9e4b538b7da5b9d066b164
-
SSDEEP
384:SdavY5ZBys7rFtl/pghEN701VG694T7pcVo1Apiw976D02XW1UTitFEWSWAmSyZW:SdavCDTXFtDghEN701MTNApiw976D02x
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 824 msedge.exe 824 msedge.exe 1344 msedge.exe 1344 msedge.exe 1600 identity_helper.exe 1600 identity_helper.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe 1672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe 1344 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1344 wrote to memory of 4380 1344 msedge.exe 84 PID 1344 wrote to memory of 4380 1344 msedge.exe 84 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 3216 1344 msedge.exe 85 PID 1344 wrote to memory of 824 1344 msedge.exe 86 PID 1344 wrote to memory of 824 1344 msedge.exe 86 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87 PID 1344 wrote to memory of 4592 1344 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\434459a2ee2379c3369985a5a3ee4f2c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec26e46f8,0x7ffec26e4708,0x7ffec26e47182⤵PID:4380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16306725519688226524,13640166339884878559,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2096 /prefetch:22⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,16306725519688226524,13640166339884878559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2392 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,16306725519688226524,13640166339884878559,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16306725519688226524,13640166339884878559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16306725519688226524,13640166339884878559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16306725519688226524,13640166339884878559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵PID:524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,16306725519688226524,13640166339884878559,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4936 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16306725519688226524,13640166339884878559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5000 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16306725519688226524,13640166339884878559,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16306725519688226524,13640166339884878559,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5592 /prefetch:12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,16306725519688226524,13640166339884878559,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,16306725519688226524,13640166339884878559,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3240
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
181B
MD5d1a71e179944ef346885f3d044470b17
SHA13e6f911d49540c8fd72b2e180fb0c55b64e6e7d4
SHA256dca1aac36e253cd3e1e1b78e68948aa93d22584e711105b4c8f1fab47f59b180
SHA5124f6ee58f5e7caebed4c92556518c61a55a06b1dd350f389505b34882df116e79fe921e58d3b9f580b01aa5493e96d9cb25fa7772f0aa4a82d0342773cb8df918
-
Filesize
6KB
MD543d866481a25844dc6549f3f0bfcbc6f
SHA1680efcc082c17f101f2387a78c4cde6e8b3d6ef0
SHA256c86b5ea27f8d3bf966bdee91d6450025a9119be0714c7b4f189d57d1837cea3b
SHA512fcbb0e65dca80d29318c4667a5c40fa72730c774035f98f022968358f94b718b71bc84ded3e037da23078424b9dd8a5f26bf6e7d3b92d9f97ed5bc200a6e4e3c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e260ca66-2920-4146-a8c6-94c1fd5504ee.tmp
Filesize6KB
MD5e5173d505cf8b1959d6c761f62b3752b
SHA18dc84f3ac985081fc1a01848938f085736b14f38
SHA25642892bfae765a01caf5cf320ffde647f36dc399331f99caa2b637d559103de1c
SHA5127b7a908ad7406ea4ed83479e8c60a60b92859edba4465f738d1a0634c5ca5ca8f5d1cfec687f12526653c3b7be2587f0a417803da1ec5eef904e87e3810eb5d0
-
Filesize
10KB
MD59cc821222a0e77dab4521d9b0a69e55e
SHA12e75bc2ce17bebee210832affa78074ed1db2ae5
SHA25647b07fd323c641a8f8c1d0ed2717ca1b38190926cd245d8eef28853fd8b6944c
SHA51203b4a9f9390d59369ad9538192275e56a4ed74a8a347dd4fb7810b0f7db1808768fdaa4649f8d45915b57b2745a0095ceeeafd719c3b1af0a389cfeb0b1cdf3f