Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 16:12
Static task
static1
Behavioral task
behavioral1
Sample
529151ebbc84056ac12a80f77bfc9255_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
529151ebbc84056ac12a80f77bfc9255_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
529151ebbc84056ac12a80f77bfc9255_JaffaCakes118.html
-
Size
135KB
-
MD5
529151ebbc84056ac12a80f77bfc9255
-
SHA1
a6cd42c2690cafabed64ee7dd7c89c8dbf36ac70
-
SHA256
4bd8caaaa32f2ef0fdace2a5b752ccedb39fb23310adb1991bf1201f5287b4d1
-
SHA512
306d5b02cc0e09449c6b079ad275819c0e9e63e5a4c45d37ac842f7c3af7bb90f11f7ab0458349e472ba86101bf22fd1194f0781194ccf641f1e34c125cc9910
-
SSDEEP
768:2bk1ATx+Bw24Tp7VDOwTXT3ipt+COC0/gAtnakyhYkmQEDCheNQGOXB9kCjclp0h:29HDO6COBgNky9Z5jclpXcDOStXGK
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1140 msedge.exe 1140 msedge.exe 4368 msedge.exe 4368 msedge.exe 3488 identity_helper.exe 3488 identity_helper.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe 976 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe 4368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4368 wrote to memory of 2588 4368 msedge.exe 84 PID 4368 wrote to memory of 2588 4368 msedge.exe 84 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1972 4368 msedge.exe 85 PID 4368 wrote to memory of 1140 4368 msedge.exe 86 PID 4368 wrote to memory of 1140 4368 msedge.exe 86 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87 PID 4368 wrote to memory of 1060 4368 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\529151ebbc84056ac12a80f77bfc9255_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cc2246f8,0x7ff8cc224708,0x7ff8cc2247182⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2268 /prefetch:22⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:1060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5128 /prefetch:12⤵PID:228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:82⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2324 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5688 /prefetch:12⤵PID:4000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5608 /prefetch:12⤵PID:3300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5956 /prefetch:12⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5948 /prefetch:12⤵PID:2760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1488,11709669879874023389,14286287850810409246,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4832 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1840
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
395B
MD5f377bd3347ed0fa406c58244bea9c2da
SHA1ec051c784e05e3351170bdc5522dcf0cde6cf7da
SHA256509fb0f38a05e1af81f74f16f859f93fc7a0425eefb697173e0d36850364c439
SHA512030651827eb45c330a5eb9d435671434efa418a4d332c47f626e3fdb59f3ff0cf78578d221b4ac06a3467b5ea5ef525b16bf6861d512ad869b39ccc4b9f1db97
-
Filesize
6KB
MD5a07c8c51f8382d753c1f6156f405eab1
SHA1ed498fc6268fe778f595be44f720cad7b6fc5b02
SHA256880dd31b31f05c704c2df1a7ca0aede9af368c5c1fd5f11ca32062aa355df877
SHA512af600c9d8c193784a847dd7a673c297a314dc57f331f174e2d98b89878dc5694a22eb55dd6009302b858de4906df0abbcebd75ec0c0cf0f69b7093e2ba1b6dd0
-
Filesize
6KB
MD58bf4e4ac9e5e2d17a3cfce857e6e8732
SHA1602db046e7613ac10cce4e66df1d0a5e043a2b40
SHA256711202ea307fbef69611f0d01466b329506478a6a3b3f9fe2ab9f4e63f3e7dff
SHA5127e88d2b9e891cf3f86bdddd3fc39957c107ee01cea58148effdeed2f1a2e7823b06a1db3d8999b8b29a4a6abddbc106b874c1a99157d63b938475e3e2b4d85dc
-
Filesize
5KB
MD5b48c96d1e037d995ecaac2684787dfce
SHA1bd04bc104dc6b6400cafa5da0d0ad75fe3c59180
SHA25690392e9045db4756d7112cec951c9b4eaa2962facb830fd2d5284a1ca43a83a9
SHA5125c49597b7755afb01c8f87d5fe8f8940be1757fdd5fb5e067b972312d49514fb8b592d5afbc48a540c20c1d2325a5d26ade5c661d6600e6c84267fd9236782b0
-
Filesize
6KB
MD5928e30e07374a9d19bbde218722546fc
SHA1c3f4e2b859396624dc2850cc64d1a9313037100b
SHA256cdfcee093f69c13efab97b38ed597321d3da67be02edfbcffcd8db4df1e7df5d
SHA5120aaebd38bb42b070d896b3d462dd3c401872321d66e412d4a7f4d4e7cbba9422a9d5af4f046905f5c81d60b2600ab91465e42315ad336f23599b0387df1972c3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD50d2cf9001780b9922e6e07913d71849f
SHA1562fa696fddd4c153796f98e95984cf25424435d
SHA2566519d73b08f226ef4d88148222a2d6818d9c1cc51583a0208ca11709eb3a52cb
SHA512068ddcbe9dfb89ef38014bfd5635f8d33f8d8f3ae3555e22ba103bc1f531ed321f7384da294b24ebe47e9adb2c394502fff6252b0ddd75d7e5e2f518e994c008