Analysis
-
max time kernel
145s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 01:08
Static task
static1
Behavioral task
behavioral1
Sample
54a574fb56b9ceb5001ec11de7ed2251_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
54a574fb56b9ceb5001ec11de7ed2251_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
54a574fb56b9ceb5001ec11de7ed2251_JaffaCakes118.html
-
Size
102KB
-
MD5
54a574fb56b9ceb5001ec11de7ed2251
-
SHA1
41ebaf72db77e0808f848c4675e3dcf8892de90a
-
SHA256
45c9ba443cb3f2677a00245e60810b8c837ce6ced2ca78bdf9bea00a267fa2e9
-
SHA512
9b2b4ca1609a9be5589beb73f5ea2fed531d11f5b07581af694e77b916d18a80e0f6130c5a078ac230b8c32fede3f4ed9c46b82020270b928ad0629f40ff95a4
-
SSDEEP
1536:OJJziSzysp65h935YPpfPZyw2/Ba9TXFJiUW3JQgT10:gJziIc5YPp5Wc9TXFJiUW3JDT6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1488 msedge.exe 1488 msedge.exe 4008 msedge.exe 4008 msedge.exe 2860 identity_helper.exe 2860 identity_helper.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe 872 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4008 wrote to memory of 2348 4008 msedge.exe 84 PID 4008 wrote to memory of 2348 4008 msedge.exe 84 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 2124 4008 msedge.exe 85 PID 4008 wrote to memory of 1488 4008 msedge.exe 86 PID 4008 wrote to memory of 1488 4008 msedge.exe 86 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87 PID 4008 wrote to memory of 4548 4008 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\54a574fb56b9ceb5001ec11de7ed2251_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc8f5846f8,0x7ffc8f584708,0x7ffc8f5847182⤵PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,15354425454631038383,5145348602384666316,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,15354425454631038383,5145348602384666316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2136 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,15354425454631038383,5145348602384666316,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15354425454631038383,5145348602384666316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:1144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15354425454631038383,5145348602384666316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,15354425454631038383,5145348602384666316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:1880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,15354425454631038383,5145348602384666316,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15354425454631038383,5145348602384666316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5196 /prefetch:12⤵PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15354425454631038383,5145348602384666316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6024 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15354425454631038383,5145348602384666316,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4112 /prefetch:12⤵PID:1160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,15354425454631038383,5145348602384666316,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4252 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,15354425454631038383,5145348602384666316,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4812 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:920
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5ad9556d603d91bdd07b90e417d721943
SHA15be8ee0ef72c3fa7982e077ca705ff173bebeeeb
SHA256beaf80ceb9ff2b1e98ac67dac5f383df9db4b82da318f5237eba7dc7546e4810
SHA512ae061a224dd32066c5ced53cba4e6c6150d4f87b0f9922bee3bede72989ffe8e727290c705714f4301c6a04a95d14939a0053a1d21af2c0029d8f9b7386ebadc
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
872B
MD5c555f5deada2438d77e5f82270098efd
SHA13c157e7fea06315d34889431063ff205641cb832
SHA256e09adcd988cb014f35f59199c0f9b747d60f6e8dd6ad6dab065d276b1617a849
SHA5128273df1c8adeeb9b7ca8c2ec57d5fefb8d6a23f551546291ac7a7b0528ec45084a9f42a62d7d84758a4ef00ce987ffbf7d246797bed0a039f7b2c23032cec40d
-
Filesize
5KB
MD5cad6a4f5e9346bff10beba975a76dda6
SHA1f7ca37452c48bbf1e088ed972d7169c0ba731877
SHA25641c5f692ef6a8729dd935929d89894406d5694d0293f626ae988cc9ebe00ffea
SHA5125cb959730ea9b0bc6b6cf9e84458432fd01f02264bf843ff61663396be85e0d4df1e351dd840f400ec13261b8d78c1471c92ff90233633d638d6e56a8b0bf5df
-
Filesize
6KB
MD5d4fa1f4aedb4995977586c112b58d52f
SHA161620714754d32f6e5843993f1f91530f9196b51
SHA256f6357aba0379ee49301cdb4c2a4a8ddf0ae19f48dead71d0fb045059b0266a6b
SHA5124c32a77a2dcc6397c4922309e8d5ca6f7fb7ba3c9ec4d55635524f614833acda2a9d758309a97d51d8ea4ead9e94bc615823381bbc8b96c94d10bec05c4a1320
-
Filesize
6KB
MD5bacf1bf8b896f3e166c8861e18b49631
SHA136045dd0dc65508113d7fc39b0ad5cb3678f975d
SHA2560fe9ea2b30972eda615da65b0e42d220ed17aeec777608a8b4e68657e9382ed5
SHA512be4834f47475694d5b8232dde17a03e32ff677be9ff967923e1cc96f5578719b5c15142ae49e01bdb5c38165d9e91dbc3056fe5f7a3618ce47b62c9832f1847e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
8KB
MD5681b55c86085e4003bf839eba0e3bffe
SHA17502c4b3337ff0b4e063efc75b67bbcb84385bcc
SHA256e83d32e5251bc93a19e0625c57ccff500e709e7a1950856b812999cee572c272
SHA512b7c473620285a400fcc6e6bc2e05bc34e0bd8fc2da41c52089ba8ebc915a97f9fc89a3b3f3f1413729bf80d82e5c9be7bd5ea52085652da25405ec2eb29f6f98