Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 20:28
Static task
static1
Behavioral task
behavioral1
Sample
539370a075a62e64e672f59b8efd7b5e_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
539370a075a62e64e672f59b8efd7b5e_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
539370a075a62e64e672f59b8efd7b5e_JaffaCakes118.html
-
Size
138KB
-
MD5
539370a075a62e64e672f59b8efd7b5e
-
SHA1
55a6d39d9647627693db4e40fb3d80f631ca0b9e
-
SHA256
aa71232a68255098d922ad62e70346f08ba2a74ca2e4bcec0183ae5758be34f8
-
SHA512
65f4c254c7c18012017314d7fd3530f7e8c85ac095f10af9aacfdbdec5a7334600c274d9770ab95b02cff0ddebc9b71b42ef4dd21292610212ed9ffd04b49c61
-
SSDEEP
3072:SC09eBiYdYEgA60todH59lvBL/r3bYtCEf1G9BNZ:SN9eBSBDrTE4b
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3636 msedge.exe 3636 msedge.exe 3136 msedge.exe 3136 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe 1444 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe 3136 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3136 wrote to memory of 2188 3136 msedge.exe 84 PID 3136 wrote to memory of 2188 3136 msedge.exe 84 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 4556 3136 msedge.exe 85 PID 3136 wrote to memory of 3636 3136 msedge.exe 86 PID 3136 wrote to memory of 3636 3136 msedge.exe 86 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87 PID 3136 wrote to memory of 4540 3136 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\539370a075a62e64e672f59b8efd7b5e_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1ad246f8,0x7ffd1ad24708,0x7ffd1ad247182⤵PID:2188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,300119449490111608,16721360336284241093,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2256 /prefetch:22⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2224,300119449490111608,16721360336284241093,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2312 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2224,300119449490111608,16721360336284241093,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2700 /prefetch:82⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,300119449490111608,16721360336284241093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2224,300119449490111608,16721360336284241093,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2224,300119449490111608,16721360336284241093,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1444
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2628
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
266B
MD5d9b1f04bc5db503ae45aa524b454f4ba
SHA1703fc30acbfd6a795029c2a85c1323c688445bcc
SHA256c7935c2e71e9ad736655c8d83a9a19b76ee3e3c38873b9b2b58f85e51519ad29
SHA5128ef02d590aa5fee3767567ae0326cfcd37e97056ab736889b2486428b0dd806c984ec121147130889cb3533eba60219e0afb0e762d7556c0a5e16252d25fc901
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD5eb4d2f997fff918a7df04a07446b5bc9
SHA1cfc59d7e8d90b4547bbd09e64f742d4107ca75fc
SHA2569520b7482c10f8169c421c8280b1d204a225bad0390e5bd6f551c50f6d100752
SHA512b6cba4a6891f44bce41cb391ccb961887127cf94423a65572eb01c435260b6a90bdd6946bf297fec7fb14ffa4c938120bc3f18f335eb732b8b88eaa5743a34b1
-
Filesize
6KB
MD5410fbdafe50fb3fad5fff377fa82f954
SHA1fe67cc34eff1ede483a8db928acbb718648b5e97
SHA25664d914b8a2a5a16041711d13aa1b6eab4520ee0157f31a39273cdc45c6adeebe
SHA512c006780c4e888a0d6f3eaf9794b8aa9b797d2580501ba6d8a7c1ef098dff9247ad81962b7fe8f14393223576d9f6a8586f14030cc90a75035ee7ce234fc494dd
-
Filesize
6KB
MD5ca4626f6c7b844b663bb9744b1c48e87
SHA1c842089608cbe4c301a817171444eefa2476519d
SHA256902bef25457062536eb7c8d328bd92acafc9c04d379761f7dcebb488e28bfd96
SHA5123e8e96f6c1674a1d1b02829f47612dd760bac519723bda1f7afd9d56a3c5518b949ccd0ec247e3bf61f349e0f61d76ebdff975d2149822dc0a03e8c2c5233143
-
Filesize
10KB
MD57827044bc0449e39860a079c1baaa56b
SHA12d32ca811dbc48ab1bb3e78ee951f5aa08090646
SHA2563d9f8e22fcb6c9b127de218f403541355e662a65691c30f21a6447e4f503c0d6
SHA51233428fe6300460c7afdf7497b17170e4862105d82372f9edf8a07393dbb64f1dd7117338e4a5f54dd94859b8252140c07e75cea99c8ab1495fe96caf03f95d20