Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 20:25
Static task
static1
Behavioral task
behavioral1
Sample
4407e48591f7a07790e92cf062890ab8_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4407e48591f7a07790e92cf062890ab8_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
4407e48591f7a07790e92cf062890ab8_JaffaCakes118.html
-
Size
139KB
-
MD5
4407e48591f7a07790e92cf062890ab8
-
SHA1
096b1b14d954803e54c66a0afb77e713e42c8479
-
SHA256
56a25e774de9d30f54a98d44d68f81dfc82dc696b475814a85dd5769b36ab2fa
-
SHA512
565f930f32cc95a6697042f30ecb2b89d526d602413328a651f06aa59e68c612ac83c8342d0af476e21af4d149e1e438ff9278b67fdef44537e3b1a68209f126
-
SSDEEP
1536:SMNeZ3vuw6bB/SKiolUZtyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09wd:SMzeyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2140 msedge.exe 2140 msedge.exe 2544 msedge.exe 2544 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe 3052 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe 2544 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 540 2544 msedge.exe 84 PID 2544 wrote to memory of 540 2544 msedge.exe 84 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 3164 2544 msedge.exe 85 PID 2544 wrote to memory of 2140 2544 msedge.exe 86 PID 2544 wrote to memory of 2140 2544 msedge.exe 86 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87 PID 2544 wrote to memory of 5012 2544 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\4407e48591f7a07790e92cf062890ab8_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff98b4246f8,0x7ff98b424708,0x7ff98b4247182⤵PID:540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,598055370549437247,15367703854436042166,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2212 /prefetch:22⤵PID:3164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,598055370549437247,15367703854436042166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2332 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,598055370549437247,15367703854436042166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:5012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,598055370549437247,15367703854436042166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:4100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,598055370549437247,15367703854436042166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,598055370549437247,15367703854436042166,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2188 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2236
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
6KB
MD5f2abe6ee6306c45afd64e9baab21a493
SHA14d89f109f8857b37134088ec300f5b792be5a711
SHA256d39fe11a25d86a40443841af369371f998b29ef55a13a45c3a7a564a8d46ab90
SHA5125d2adb81413c28f3bcfc501663ed7f0fe8567d6979ea591c5d8e2a769143d91c09e96a129a39935ebcfa5c3b37b344c9665961628496c2a6606d50ed90a42734
-
Filesize
6KB
MD50aa08a7e7a048685194a8fbeb87478e2
SHA19041c697fa5509385486967a0dff2bc5a680d043
SHA256ca77a9acfebff91e73ab8769b67be75bfea7eef634342bea58efc523bac33c30
SHA5127fcafbc9ddc4669748f4b8d74532a253d2691fbaf4cc19d4fa4828626c5a51337ddb96dd1a603901e17274995a22ef113a4938dc3540fbf4a54d20c8392777af
-
Filesize
10KB
MD589e77ecaa555df774383d06509844454
SHA1c774745fff513000a2022dda5efb88412957cae8
SHA256ef73dd381396359d04264890014091359e962342539e0b47460c130cf90f95f5
SHA5127d1e8d6aef0ac1177847272f10703986c73933b87a187aa4496065a8b6af6653ee879d14a477a8307c6eca70fdb4ccc2291c11f198ac7de07b35616c140ccf52