Analysis
-
max time kernel
145s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 06:46
Static task
static1
Behavioral task
behavioral1
Sample
465626d8c1da9c5004051a56989c5e4a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
465626d8c1da9c5004051a56989c5e4a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
465626d8c1da9c5004051a56989c5e4a_JaffaCakes118.html
-
Size
16KB
-
MD5
465626d8c1da9c5004051a56989c5e4a
-
SHA1
44aa9774aca54e6e93f5f6c341bd25ffb9d07924
-
SHA256
1c7d15334e27b6929dade3331aa98f36b42f7a61a82abf80b3965e12aa776187
-
SHA512
9ce322f220f086190372ba37c10a5c1aba51b791eb8bca6b869d4eae3d0e184a968045726811167acc8c2fa6c825912f1892333cc6696d81bc437da84ef808fe
-
SSDEEP
384:SIlgjWObzo83YwccoYXIKuhThjr34My1g7QWvy+Cq:S0gf3YwccoYXIKuhThjr34XOQO5Cq
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3452 msedge.exe 3452 msedge.exe 1512 msedge.exe 1512 msedge.exe 1256 identity_helper.exe 1256 identity_helper.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe 3108 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe 1512 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1512 wrote to memory of 4436 1512 msedge.exe 84 PID 1512 wrote to memory of 4436 1512 msedge.exe 84 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3024 1512 msedge.exe 85 PID 1512 wrote to memory of 3452 1512 msedge.exe 86 PID 1512 wrote to memory of 3452 1512 msedge.exe 86 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87 PID 1512 wrote to memory of 872 1512 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\465626d8c1da9c5004051a56989c5e4a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3e8846f8,0x7ffa3e884708,0x7ffa3e8847182⤵PID:4436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,6440569421982388296,6666446780898485607,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2124 /prefetch:22⤵PID:3024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,6440569421982388296,6666446780898485607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,6440569421982388296,6666446780898485607,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2944 /prefetch:82⤵PID:872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6440569421982388296,6666446780898485607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6440569421982388296,6666446780898485607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,6440569421982388296,6666446780898485607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,6440569421982388296,6666446780898485607,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6440569421982388296,6666446780898485607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:12⤵PID:4340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6440569421982388296,6666446780898485607,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:12⤵PID:3360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6440569421982388296,6666446780898485607,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5704 /prefetch:12⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,6440569421982388296,6666446780898485607,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5684 /prefetch:12⤵PID:3828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,6440569421982388296,6666446780898485607,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1936 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3108
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4444
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
6KB
MD57ab7be3165cecd7a2cff227c8e5c0074
SHA122b031aa46994e517dcce7f7e2cbc29762ad72f6
SHA256851ad42ad58ad808d1b466beec3578d23a65bb661bfe76ab7c6948d76b2484f4
SHA51207b0ba950f889ec1e598b7fbc777b5665a894c5a62d45850de125e8b3da384690e3d33d056f6002693fc0ee94b356bf21ba8009851b02253d38251b0466d869c
-
Filesize
6KB
MD5b53a8c30d755ab09656a18fe15401a61
SHA1733cd8278e9ba578afa1558a5cb18e36a73fee50
SHA256748d9d9e952f7ef366bc53c477b14992157e8771bbc86a548e4f9bab293a6ba8
SHA5120b994a9101c7dc10998d13a84a4d58602dc67e1299ee1e4f58f9be82e82410e2ad33e93cd84557414b311d08ea6af51a97b785807a6653e672f7f3af83a1df95
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD58565402eed1026a6c97278d3471a19ab
SHA15aaf1f9c4a3cd3177ba957fc7d5f3b4faa2b25e3
SHA256d7af3a70c62671e8408a18d4d78b5ecd27a96378f3c938155e3b2b1d35876bb0
SHA5121673c4678dc41e530face4feaf4e177a341e3c0c8c3d4f3b2e5821660d246f8945e393754f28cc5cb454530fafa6da6fb6aa12fa3e38e72ab7f9726312a28467