Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
440bea60904b7b4fb7982efb1cd348d6_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
440bea60904b7b4fb7982efb1cd348d6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
440bea60904b7b4fb7982efb1cd348d6_JaffaCakes118.html
-
Size
34KB
-
MD5
440bea60904b7b4fb7982efb1cd348d6
-
SHA1
f24f1ef88d65a21a6e66e3f3ba476cd3d527301e
-
SHA256
88f7d8ed9cd449d18baaf199fc2a3e4f65ab006120c863f02cd82c9be08d5760
-
SHA512
187faae23cd59c104b454b7fcc0286df03c208300a75ef6ee32a9ccd6c1c65c29e959083f3cd53babbbb062b73ba033afc5c8d280762d54df30bfb3c34eb213a
-
SSDEEP
768:djhLDJ9HE4qEEANuaPId8ZAtDqCQl1rzGEe9zAJK5AADUPLOHwQBYvK55+ViCput:djhLDJ9HE4qEEANuamqAtGnrrzGEe9zD
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4080 msedge.exe 4080 msedge.exe 2600 msedge.exe 2600 msedge.exe 3668 identity_helper.exe 3668 identity_helper.exe 824 msedge.exe 824 msedge.exe 824 msedge.exe 824 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe 2600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2600 wrote to memory of 4528 2600 msedge.exe 84 PID 2600 wrote to memory of 4528 2600 msedge.exe 84 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4940 2600 msedge.exe 85 PID 2600 wrote to memory of 4080 2600 msedge.exe 86 PID 2600 wrote to memory of 4080 2600 msedge.exe 86 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87 PID 2600 wrote to memory of 1556 2600 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\440bea60904b7b4fb7982efb1cd348d6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc13cc46f8,0x7ffc13cc4708,0x7ffc13cc47182⤵PID:4528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3839280956429004800,800223722770495808,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:4940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,3839280956429004800,800223722770495808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2456 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,3839280956429004800,800223722770495808,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:82⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3839280956429004800,800223722770495808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3839280956429004800,800223722770495808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3839280956429004800,800223722770495808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,3839280956429004800,800223722770495808,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5624 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3839280956429004800,800223722770495808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5352 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3839280956429004800,800223722770495808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5136 /prefetch:12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3839280956429004800,800223722770495808,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5040 /prefetch:12⤵PID:3116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,3839280956429004800,800223722770495808,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,3839280956429004800,800223722770495808,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:824
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
309B
MD52b92e1ce2195da8a9543b7152d2982cd
SHA109a1176c2c410b240e98f473e0b4f4ecabdecab2
SHA256e6356a5df4a65664f085fd86ccb07f8ad910dde0c3de10aa69e79556282eed82
SHA5128485563046d5069aac0ce4c6ca4249229b076e78c6a1a069827078dbe436e22f1f0cfdb15e8a2bd23c73b55f50ce8818ed0307e1ea0af77efba98ae3abe38e5b
-
Filesize
6KB
MD5f39fa065cda71e409ffb8f19496201c1
SHA19ea2f71dcb3a84a40c93c0b366f1276c1423f9f3
SHA2564e0fca5dbcb12e3b094975d51b2c81a9cd376bcae6ffaaf7181da6a39e12dcc2
SHA5122c8e16b7d4362db41ed01c3603e183a479c4eb73d694a02d8cdf9ec27345019a06830f6fb5314710160fefcc1ffee78ad509344c624f4d4924a800e97ab6eb6c
-
Filesize
6KB
MD5af3ba648e6e251c532ca1fe4da7fd406
SHA117b3e1dcf0d5d0bd5dd0122970a8c5675d48fa91
SHA25694df5afb9036b00c0ffa6bd33d45aee81f8f98fd3183ef967f715e1153c1eff4
SHA5120926142141f57c448013bac175ce3b44971039a778986b68fa7ecb9c96adfc77456b804fa5c4b43662b78a5e2416d5be56f801b678e7cc73b5a8cf1c40ec1d7b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD55a8e0b014dd2abfe7842a2889d3cafc0
SHA1cd93d119a9ef23906f9213b7fa60f75b79e31b58
SHA25632fd12b69cdb8bffbad29c66d1919ba9c81054ece815a2edb02dc18e699f60e2
SHA512885d5c5963c817fe6a921b184e9e2ba0613aca38134ab3758250d31d48b9e723ca01672e8cca71e3f49b7c28207d8609d88ca99948e0bf066ed108d5e4df50ed