Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 16:12
Static task
static1
Behavioral task
behavioral1
Sample
5291f91df5745b45bbafdd75952f7090_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5291f91df5745b45bbafdd75952f7090_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5291f91df5745b45bbafdd75952f7090_JaffaCakes118.html
-
Size
14KB
-
MD5
5291f91df5745b45bbafdd75952f7090
-
SHA1
be6d28f502fbb07e95634b0c2282ed244bb189b5
-
SHA256
80abb34271c302f695f1f3ff2d9b8d726f8113f3d88cf94c69361036276f3509
-
SHA512
5ef17c3b7657a9d0e70b22d1f24287b3ea0a8dc6972a9e517f84581b91e217de7a5a462a24427ebb1cca60c77a53a9af64dc3433141e93edf2b10745d0b8518a
-
SSDEEP
192:Dpf2TLZpD2TBlbsu8z6t2/bSnJe/RfCgcychRb5yXP7Hh6XFI1o8/F8IJXIuBYYv:Dpf2TmBhs0t2mJGczIKQ8IRFIg
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1260 msedge.exe 1260 msedge.exe 908 msedge.exe 908 msedge.exe 3920 identity_helper.exe 3920 identity_helper.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe 1832 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe 908 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 908 wrote to memory of 4124 908 msedge.exe 84 PID 908 wrote to memory of 4124 908 msedge.exe 84 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 3356 908 msedge.exe 85 PID 908 wrote to memory of 1260 908 msedge.exe 86 PID 908 wrote to memory of 1260 908 msedge.exe 86 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87 PID 908 wrote to memory of 2916 908 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5291f91df5745b45bbafdd75952f7090_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff240946f8,0x7fff24094708,0x7fff240947182⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15671525516578648688,11822981037533209105,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2180 /prefetch:22⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,15671525516578648688,11822981037533209105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2532 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,15671525516578648688,11822981037533209105,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:2916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15671525516578648688,11822981037533209105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15671525516578648688,11822981037533209105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15671525516578648688,11822981037533209105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵PID:1904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,15671525516578648688,11822981037533209105,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5064 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15671525516578648688,11822981037533209105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15671525516578648688,11822981037533209105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5244 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15671525516578648688,11822981037533209105,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4152 /prefetch:12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,15671525516578648688,11822981037533209105,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4160 /prefetch:12⤵PID:3932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,15671525516578648688,11822981037533209105,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5528 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1832
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3996
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
6KB
MD55cd090483f69844301b5c4f2dd5a72e1
SHA1d1f64b7d6ef1306b8db5c38b3bf86c4f2ef9601f
SHA2569a0ea0659f0407c452f0348e9fdfebbed78633aa17c64e461cf161e013e72c2e
SHA512b76c95d460479768af3b864c9b626a96133ba951f7c729bf9f072c3d4e2270022cca24401acbccdf903dfba74229df7ef9f395f49a7346a6ded9e6c62ccf025a
-
Filesize
5KB
MD5895efa6280fdd7a88790a5d9b835b7e4
SHA12d3123f2a18cd08a6960c993dea40c1c05c801c8
SHA2566a4c1968873e239b8aa4a808fb79d2617a4870b126b76d5d0b77b5b0d37d7e3c
SHA512c13650f6aa1aa0d5d64449e38d12abc41b2913844a5d5f3812ac7a9585ea44ab76733b448940f3ea0e057676b5460edf4dfcc7630fecca7ac685735283a6d882
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5e71c855dc1efd1fde0a55a35a0db1d9a
SHA1158097b8a90c8a8eacba6c7b3a57a06fbd2902f6
SHA256b0f424329faf55b1ff171a83945b5c05e8bb5c34501a1002e7e5ae2d1b3d1b2c
SHA5120355b4c06b62c7015f7a52d000a4c57d53f2323744df6cd0621cb12017ecb8c04e9da6e0442bf1f49d527e4e0927bc98a92e21f3e93c63533f2224310fd0bba7