Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
5491af425e47fa09bb79b0d80cecfb83_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5491af425e47fa09bb79b0d80cecfb83_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5491af425e47fa09bb79b0d80cecfb83_JaffaCakes118.html
-
Size
1KB
-
MD5
5491af425e47fa09bb79b0d80cecfb83
-
SHA1
b81d10cbcdd7e146fed5841a061a798abf1ba4b0
-
SHA256
7e3c5c6dcba6cb68089d54ba5997efc192f71df9f697933b7ef7cd50bfb200ba
-
SHA512
8dd65ac670d55314601c3dfe65c762b32f5d30c74398e4cbc9c95c96ee3659469eb06118c708e2d371565cccc912223ad258c1865e7428c5d0c3dfab8e54349e
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2384 msedge.exe 2384 msedge.exe 1072 msedge.exe 1072 msedge.exe 2872 identity_helper.exe 2872 identity_helper.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe 2148 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe 1072 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1072 wrote to memory of 4036 1072 msedge.exe 85 PID 1072 wrote to memory of 4036 1072 msedge.exe 85 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 4888 1072 msedge.exe 86 PID 1072 wrote to memory of 2384 1072 msedge.exe 87 PID 1072 wrote to memory of 2384 1072 msedge.exe 87 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88 PID 1072 wrote to memory of 1876 1072 msedge.exe 88
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5491af425e47fa09bb79b0d80cecfb83_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff84c8a46f8,0x7ff84c8a4708,0x7ff84c8a47182⤵PID:4036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,14353322338120022656,11023992089650800408,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,14353322338120022656,11023992089650800408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2272 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,14353322338120022656,11023992089650800408,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2748 /prefetch:82⤵PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14353322338120022656,11023992089650800408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2308
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14353322338120022656,11023992089650800408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,14353322338120022656,11023992089650800408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵PID:4984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,14353322338120022656,11023992089650800408,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5176 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14353322338120022656,11023992089650800408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5276 /prefetch:12⤵PID:4892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14353322338120022656,11023992089650800408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:4128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14353322338120022656,11023992089650800408,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5536 /prefetch:12⤵PID:1216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,14353322338120022656,11023992089650800408,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5304 /prefetch:12⤵PID:2660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,14353322338120022656,11023992089650800408,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4680 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1684
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\016dff2b-8ff8-42b1-aa23-94013b7dc42f.tmp
Filesize6KB
MD550d11944cd469ec018a5793d603ebba7
SHA1ca6a6f9f117b05c3864298f83a84682a7719ec57
SHA2564683bce2841ad34e977275a4fa0cb899cc8eb10215a0becd0636511b5b3b4d09
SHA5124d69967ef593c6b48ef1e0bc00b22e20bc1aef0538965a96103bcdcc55a4eb3e713d337d598e0203ad13f866f984a5355245633abd97324d57da0e1c799dfd14
-
Filesize
5KB
MD5874310d9a838831bf750a9277fac7949
SHA16959ecce8dbae1813ce387d7d01d4c9a71291526
SHA25677b4c60828bc704a0618d3ad8e5c69f4663f8e03de5315745877a7dcfcc4ab30
SHA512ed3fcdb303ad7d482b19b4b77af20fb53dadfa35be2d7d14562aa2c7355a5089d8b5d76b637df559135e46a8dd22ae9dd60f56538596c5a4681d1af4bb237c36
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD59dce23e083bfcd9c64fbd20de123cc5d
SHA1f3cbcb3f944cd31bd390590e9aacd1198e98da16
SHA2563e43cf8f32f7408d5a449349aca60e71a65a3ee257b00a925bef46818931a681
SHA512a2ea26107cc4755428002014791a575d69955f10ee31228acf4034d20c1fe5319e105b79cbca501c4b73e4a3ff0e9e45c3c6007f3cc7a598534425e7835846b4