Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 16:25
Static task
static1
Behavioral task
behavioral1
Sample
529ce29dcf2ac905066e82dca3a5d6b1_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
529ce29dcf2ac905066e82dca3a5d6b1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
529ce29dcf2ac905066e82dca3a5d6b1_JaffaCakes118.html
-
Size
139KB
-
MD5
529ce29dcf2ac905066e82dca3a5d6b1
-
SHA1
7faa69113f5b3376e4298edaee6c433a0de41286
-
SHA256
dd1b0026d7310cf5f08af8789afe839f65a3debe805ce417c1fb8877387b75b7
-
SHA512
628a8389b8172a565a8a90212c6e6ca3747c82b5f42e8bc8a0f882009377546415813fcf1c2cfc1e96058ae4074f3a84b04d7073792fd51eee00633580c41742
-
SSDEEP
1536:SNNCcFp3N4J4rl5wGFYyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXu:SNrFYyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4984 msedge.exe 4984 msedge.exe 3604 msedge.exe 3604 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe 4656 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe 3604 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3604 wrote to memory of 4716 3604 msedge.exe 84 PID 3604 wrote to memory of 4716 3604 msedge.exe 84 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 1940 3604 msedge.exe 85 PID 3604 wrote to memory of 4984 3604 msedge.exe 86 PID 3604 wrote to memory of 4984 3604 msedge.exe 86 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87 PID 3604 wrote to memory of 224 3604 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\529ce29dcf2ac905066e82dca3a5d6b1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8cc2246f8,0x7ff8cc224708,0x7ff8cc2247182⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15831552428220399547,14556118176830695141,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2072,15831552428220399547,14556118176830695141,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2072,15831552428220399547,14556118176830695141,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2948 /prefetch:82⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15831552428220399547,14556118176830695141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3352 /prefetch:12⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2072,15831552428220399547,14556118176830695141,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3376 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2072,15831552428220399547,14556118176830695141,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4980 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4656
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
5KB
MD5fea7ca88b0bcc5fdae4a257334af4f0f
SHA1a70046259fdc80ee390c65e21fc2166ec3af73e5
SHA256cec4199580f66adcfb8e832630590b83a0356a2df78ddc93cb200aaadd911d72
SHA512c7f37208f352a13337a4d6c100cd15641ae287c3d9783fed91f4740f80a04aeb7826044f9197164f0bc221548901473a667d45eb895da072e053976ed77cd6fb
-
Filesize
6KB
MD52439e24de892fff4c90d180682040068
SHA1a070cfde1361a630fd7d21ec93f7f31261482eb3
SHA2569ad374c6da1a5ad31ea6a2e56b07f8ce383a804c5d8add769cc43a7ca31f6428
SHA5124410932d1ff038a7463e827e0f65a60431a66f9c9da37a6bb034654c71739afa0cde169d714ea6ffd1c895abc3f68e32a44ffef589020f39a0a1caae7a517744
-
Filesize
10KB
MD585929cc1b7966c12d77ab9b1db7e7a91
SHA11b3dbf8c777f8eac0ca5e4975d705e47d8fe5267
SHA256d81c975cf1126334629b4bcd426c3727370bf72c095dad4e6c8a360d66757825
SHA512a5a7468d62d48722b6ffad5edae8dfa47dbdc188ba40d275b15180e5cef08bf8ead456180961bf763f52cfe0d69186d879d33bf6e033fdfb489f771a41057b43