Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
46307e007e1f0918d08dad5cfbc42308_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
46307e007e1f0918d08dad5cfbc42308_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
46307e007e1f0918d08dad5cfbc42308_JaffaCakes118.html
-
Size
26KB
-
MD5
46307e007e1f0918d08dad5cfbc42308
-
SHA1
e57721ac3046c75d295948e07d58f271ce284d29
-
SHA256
b9b5fd3c889f068c1bed8760385fc1c91f1341c3e903c901099cf9f9c5e51dc9
-
SHA512
f4e036e99a266c7b6364d4d4a70b513ccf569c898046d8575c825454537d9f2c12cb44e0db762a53a9d52804d3831543fd83b599bd046d57e1c8d4b5b17b5312
-
SSDEEP
768:RNUGjUtBb76DRD7Y5hXhevft4e9xulwJnOg:RNUGjUtBb76C5hXhevft4e9x9JOg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4608 msedge.exe 4608 msedge.exe 4968 msedge.exe 4968 msedge.exe 4828 identity_helper.exe 4828 identity_helper.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe 2040 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe 4968 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4864 4968 msedge.exe 85 PID 4968 wrote to memory of 4864 4968 msedge.exe 85 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4612 4968 msedge.exe 86 PID 4968 wrote to memory of 4608 4968 msedge.exe 87 PID 4968 wrote to memory of 4608 4968 msedge.exe 87 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88 PID 4968 wrote to memory of 1328 4968 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\46307e007e1f0918d08dad5cfbc42308_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd64e246f8,0x7ffd64e24708,0x7ffd64e247182⤵PID:4864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2168 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3020 /prefetch:12⤵PID:1328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3048 /prefetch:12⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3256 /prefetch:82⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5016 /prefetch:12⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5160 /prefetch:12⤵PID:4448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5572 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5896 /prefetch:12⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5952 /prefetch:12⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4172 /prefetch:12⤵PID:900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:2372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,12354088837542824241,9988443987050999876,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3656
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
551B
MD59f8d50982c24688b74459ca5f2e08e20
SHA10fb3ea370868aad69d334cb37c761eec36a10489
SHA2562d969c0a3623f807d2e80366c46406d2fa46c642dac5b9b456eafde296763394
SHA51253844675038e734b45cade284ffe0e52979187e32dedfd44b809d09cf97798094b206a5335730a077754378c2c4aae8b20a907332b1ba759b8c9d7a406556964
-
Filesize
6KB
MD53abad435ee32db846d77f49185a240fb
SHA1926fe77e1da4d818581f85cf006a3dcd47ec1b0f
SHA256001614edc68dbeec7bae4c8e6ce9f273e85719ffee96b460d564c86b064bd9c3
SHA512ad010cfa7d8a558574c500e64dd141d447d380cb43f866ed04feb26d471b901343af2f81532f7ccb7a613fedfd9ab2a7739e2f65c89c22228cb93365e566e5b7
-
Filesize
6KB
MD50c579c4912fc14ed5c1f400300e929f2
SHA1432d5421b774effdcd5044e5568f5c01f2b9abc9
SHA256eedbdd43a218131f0ad8f8ed1f02ae72bbcc8ad07c009a77ad0af505779739f0
SHA51271b31894052e9216303a87c5c43265041323a550e22b64651abe46ca6f0fa3d9e21ff891810cffe153cd28c0c487119f163d44b39c269fcb074da32687c59ff3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59a302d7c3bd643bdca72fd48e4817aa9
SHA18b016bf6a75bde9a265d054774738bb4e47151c2
SHA2564d05af3166bb95d61f7a8a3079c96038390e5a22352b9dc61ffa881fdb37f79f
SHA512116412fecf3e3d81cef19d7863774a04c99acb54f962445fcad1064836fb495e65433c788fd19017dc6fef29d3ebfcf3d23799a51411f19ca6c9a6922439d52d