Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2024, 07:22
Static task
static1
Behavioral task
behavioral1
Sample
467864eac509a86b38c0236ac47907f7_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
467864eac509a86b38c0236ac47907f7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
467864eac509a86b38c0236ac47907f7_JaffaCakes118.html
-
Size
145KB
-
MD5
467864eac509a86b38c0236ac47907f7
-
SHA1
7be1273a80227ce75ccd5b7d3509eefc4c648114
-
SHA256
8a374f3ec17e875c86eb4b9d3bc6853fbc3c1a3c9b46097a361891e2a93664b8
-
SHA512
4994f6a39ecde5ab21dc6d5a6687d4c929c46ab442502da201e087d95fe71ec98841733601188e35c1a9f7f35a65fd9d0351ac98ef1ae0e2cdfd9298061ab158
-
SSDEEP
1536:acrXISOzv2696PYS4sG8GbcBhCc2Z53X5l6HUqdHnYm86wGwvwx/wPk2sTw1w6cf:VnM269//4BhZ2PX5loNqmNj2I+iCeukB
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 4824 msedge.exe 4824 msedge.exe 3372 identity_helper.exe 3372 identity_helper.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe 4856 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe 4824 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4824 wrote to memory of 4640 4824 msedge.exe 84 PID 4824 wrote to memory of 4640 4824 msedge.exe 84 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 4892 4824 msedge.exe 85 PID 4824 wrote to memory of 3160 4824 msedge.exe 86 PID 4824 wrote to memory of 3160 4824 msedge.exe 86 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87 PID 4824 wrote to memory of 1784 4824 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\467864eac509a86b38c0236ac47907f7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec7b046f8,0x7ffec7b04708,0x7ffec7b047182⤵PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2192 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2764 /prefetch:82⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:3712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4876 /prefetch:12⤵PID:828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1764 /prefetch:82⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1764 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5496 /prefetch:12⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5480 /prefetch:12⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4148 /prefetch:12⤵PID:1236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5452 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2056,3698410297806509653,6950802218511645507,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5372 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4304
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5bc760a39ceba434c5cecc1efc354f898
SHA1ee584b93449c6e025935870d35e95f939b6c71af
SHA256e9d47ac869906d1411b9ab02ae1bead5cf89f21c43599585e9bd033ecbd78cfb
SHA5125623a5a21bedff4de940c8e5b1205f4f02c6e4ed3254526d8f93011a6d73d6b48fce892dad947aa82ee39a2c903e15019082a63825e227db08de7026c2599408
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
470B
MD5a2d9835645fcc3f590d9f03f1ed839a5
SHA189fd51d8072a28193c685eb1fb044e61c4a6e141
SHA2564480c210a7b56c22e5e3d222166011b22ee86e214a44a1216094ea1384a4af13
SHA51280280eaacf72c37df880634b94171c5f52da99c69d2bfde4047b08300d98796854a03d8474539b073c96d36d8a508ebef836d3f4d8954703deadb1436c938f6d
-
Filesize
6KB
MD5dade7d05e5d3ada4c2aefb40b00139e8
SHA19357fc0382ede6f18f1437fd077a6337a277e31e
SHA256082df849238e8ce607f94084e3837ec642f6a8876f2bc02ba1a48d5e4edbe23c
SHA5129d2f6c405225156815468f810a81172a7956c74ac0d1d7dcadcf1a523646b5e1c7b2e2cf6640ef37aeab768de25059bf7db75722fac354951eb2133e11a34957
-
Filesize
6KB
MD57277d8268029f2e42036346cbe690a41
SHA12c60b62ea3b57a7cb5bf981ccac8abd686cca5c1
SHA256d27b9796291f6de0bda1466fc1483bf319c1aba6fe5c1251acf1e82761ccf99d
SHA5121570c4f9b94cf82fd44ed861fb176fc4540792a5f8a46f965bd9c3d705bccc0155600938ff5190a4d5e6fe5b98434c388fb96770800cb2abde24731e3dc3c7b7
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5eb522322128c1c24e3f44027ead49d1b
SHA139e197ea4afe048bd601194cc7cd01f513860992
SHA256fb5a84a6c232b4c6ad3ee85d1a6c90f82453f92556937a1fad7f52e32879ef29
SHA51213a05aaac7fdfbf9db99888002ee73f79b8c24e701339cf0a4d70520c442409d786d5cf610b55aaa3a92afbeac3b2bc08efddc5e3b5f85e94fddf386528c4e5a