Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 18:38
Static task
static1
Behavioral task
behavioral1
Sample
531e8db93b8355b7d216d2012657779a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
531e8db93b8355b7d216d2012657779a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
531e8db93b8355b7d216d2012657779a_JaffaCakes118.html
-
Size
9KB
-
MD5
531e8db93b8355b7d216d2012657779a
-
SHA1
56fecceaa259d5dd4793f032f10130b884974751
-
SHA256
a920534c47f8cae176ac79e8d2b4c0876efd1a4cebc239f12c589388525ba35a
-
SHA512
1032e33ed9cfe9b04d8240b7bfebf8cfadf01147cc3b6af0d8f1ec5002efce13b5306cd651e9bb1fc93887cbab615a41a552af4bc2ca135c9386cfab8715925b
-
SSDEEP
96:uzVs+ux7e9LLY1k9o84d12ef7CSTUnGT/kzipFHlVHcEZ7ru7f:csz7e9AYS/60dPHb76f
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3032 msedge.exe 3032 msedge.exe 4016 msedge.exe 4016 msedge.exe 4704 identity_helper.exe 4704 identity_helper.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe 1212 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe 4016 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4016 wrote to memory of 1892 4016 msedge.exe 84 PID 4016 wrote to memory of 1892 4016 msedge.exe 84 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 2004 4016 msedge.exe 85 PID 4016 wrote to memory of 3032 4016 msedge.exe 86 PID 4016 wrote to memory of 3032 4016 msedge.exe 86 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87 PID 4016 wrote to memory of 2200 4016 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\531e8db93b8355b7d216d2012657779a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc3ec546f8,0x7ffc3ec54708,0x7ffc3ec547182⤵PID:1892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16738097108615690746,12643504952768568123,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2112 /prefetch:22⤵PID:2004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,16738097108615690746,12643504952768568123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,16738097108615690746,12643504952768568123,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:2200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16738097108615690746,12643504952768568123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16738097108615690746,12643504952768568123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:3468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16738097108615690746,12643504952768568123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,16738097108615690746,12643504952768568123,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5144 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16738097108615690746,12643504952768568123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5248 /prefetch:12⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16738097108615690746,12643504952768568123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5272 /prefetch:12⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16738097108615690746,12643504952768568123,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:12⤵PID:5080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,16738097108615690746,12643504952768568123,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:12⤵PID:1760
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,16738097108615690746,12643504952768568123,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2988 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3112
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5142b53bbd8e5fb28db9ca0decfd0a43c
SHA1b49b8fec49baf99d8d954f4998de203393320541
SHA256b49da0bd5485b353f004393b597c376280728a074a1c20018e0071e470bfca64
SHA5123979f3de5fc222e98f568279a040d628b49c074e2c58a6940d44a8c7f4344095afac4f4ad5d7f1275a97a7f6d26bd8046777df9a29b4d719a0dcc6c7b87189e2
-
Filesize
6KB
MD5a6d00114f6ed08cc366e4f27e0cd1452
SHA1ebd2b97c1dea9f2e3169dbad8df45a6cc22179c6
SHA256f90c26a199ba23fc617e330cfffb88428938ca32f4200dc291700105a754dd07
SHA51264edf8a43aaa1121b3f59e7f50efadb2c587ccffdca8e91ccf8eda3cb148912d8ffb5e5bb37c705239fc0e7ac6802ad066851220a330014197c150f54a6059a5
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5cf293e5dd9856648120dae1f1665529e
SHA14f10852371349b9d7326d4fa4cb760b88122086f
SHA25627ff596c90a518eb22393e4a2285e8140c9420687a194f59f61c5431cef530dd
SHA5122229e26a1ee2951542751e2dfa4f97c9fe5e47a1a1b61af52ffbe0b4839d1a9729ce6a0fa6677f33378f7f6d87b6c9a3152d6c3b17938b1fb0aae9edae8c486c