Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 19:51
Static task
static1
Behavioral task
behavioral1
Sample
536c94ac263bc5ae35becd313a904ed6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
536c94ac263bc5ae35becd313a904ed6_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
536c94ac263bc5ae35becd313a904ed6_JaffaCakes118.html
-
Size
20KB
-
MD5
536c94ac263bc5ae35becd313a904ed6
-
SHA1
46e23c4bdd6effc5c441fe739b30990317d8b367
-
SHA256
ce3ab2b00c0592d6c6f6ab1d26de09c5836eb9e5ceb799c8e40ee302f6a8303b
-
SHA512
d910dfc76d35b7b69bb2ed89985599e7a0345f6b8ca9def1c4aaad719ff640e8908bad82abd0d77342c13074745ee61627606ac3cec23ae2dc0552bb4d702383
-
SSDEEP
384:Xg+UslhFn1RvLsGQl1grYag59hus8IpOqP+B7:wJslhnxsGSSrYDr8Iph+1
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3316 msedge.exe 3316 msedge.exe 3464 msedge.exe 3464 msedge.exe 1428 identity_helper.exe 1428 identity_helper.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe 944 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe 3464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3464 wrote to memory of 4572 3464 msedge.exe 84 PID 3464 wrote to memory of 4572 3464 msedge.exe 84 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 868 3464 msedge.exe 85 PID 3464 wrote to memory of 3316 3464 msedge.exe 86 PID 3464 wrote to memory of 3316 3464 msedge.exe 86 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87 PID 3464 wrote to memory of 4264 3464 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\536c94ac263bc5ae35becd313a904ed6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa1a8146f8,0x7ffa1a814708,0x7ffa1a8147182⤵PID:4572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2224 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2736 /prefetch:82⤵PID:4264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:2088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5360 /prefetch:12⤵PID:3460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5488 /prefetch:12⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:12⤵PID:4220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,16524480904278507406,4801517199484153344,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4068 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:944
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4688
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
1KB
MD5912957b281905d8812001f48ab00e578
SHA12a0334f2eac45045144a8393df9548948b14a7f0
SHA256e03b1690ab73af749981bdc0031cd33041d3bcd8bbdf16d52f0602944d882239
SHA51294c9037c73c6aa4f345c81a88596da270b3ce2de96c055a4f5060fc0a481def113ea8917ff5eadb039739be5a22220159423b9b4140a4f677770dca5e5aca172
-
Filesize
7KB
MD5a718c8487a35d4b2bd27aaaf1bbeba3d
SHA1dcf43e8560515a2ba70ff31c5db6e42526a669e3
SHA2566161d7f31f6b8b52d031982f9dbf3879b79b73bc231638588c7587f39c42cf7c
SHA512f94ff8fc7de6e44bd4e4a88fe25d0e88ae275238848236ae314ca60b079a6b25ceea4567edead348bdecfb7e1276852ae0c88ffbfbabaea93eee03e19978abb6
-
Filesize
5KB
MD5abf3094b2025970b7b21c94f5d9d0118
SHA125b26ad99c4200c0f3b76708553ffe1c781efc2e
SHA256325804511f5efbbf2cfe705e05e16164bad87d28928d13f6e4f17f5d6f288573
SHA512586901f79660d6873ff20ecb8076f30be84ed27061606fb63706002261d0235131a9e4127a396a13edfea660197777008b8fd07562f26d034a7bb2fc422e4869
-
Filesize
372B
MD5d88cc415a382547c0cbc008fe3f85563
SHA10e94b8fd0823490048d8f8d2ecccbbe5ea405059
SHA256ac92570a651e27a4737707cb031c133be1da8bce55940b6d37a9a678ad41808d
SHA512aae371b5e01c33f9c291b29561ce77c745eacf9262c89a1c6c8e2f498571bf97681b804e3f421d00cbbf03ca995b2578f7d3c724ff496210bdb6894d95630c3d
-
Filesize
372B
MD588542730e684604d72a8a8a27650d022
SHA11ab55e41c1623a638e46f63a307baa5696e440f4
SHA256698798e7ecb2285cbfc06a4444907dee3a5182811bca11be9de760f4948edb73
SHA51210a746958c4ed6e1d59516383c22bcb7b3c8b9c2e38cc50465e6e16128025c47ff45eb264f82c36f8658c7bbf682aad235d58471daff3ac5c4efc3e33b0269b3
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD54993b975c04b4bdb555735bc971153e5
SHA1029a80a9e0d455689d0a33056722cd0558ab3989
SHA25687dfba6d68ac7088368c5ad43b6eec668a8ef422e7e6caf81669b525b9891941
SHA51231bd6cb5025a6463c91b99309db632c3f7c381629975716543392bb34df47c5ae94c95120ef08c83e3983d7b22f248a3ae7918700982a9c543b4c5ff4cdf51fe