Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 01:09
Static task
static1
Behavioral task
behavioral1
Sample
54a58c4ef70fe7522d24f48e585bc557_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
54a58c4ef70fe7522d24f48e585bc557_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
54a58c4ef70fe7522d24f48e585bc557_JaffaCakes118.html
-
Size
55KB
-
MD5
54a58c4ef70fe7522d24f48e585bc557
-
SHA1
8b88bebd3736497eeba5b318cf15a54c583b724b
-
SHA256
aca5ce6e93fffa74fff44744f0c23ec0f488f1d96eecfc1bc46adadae711804b
-
SHA512
76d3cb1c744f6ff3da76ea7d3c54248c650e2160de173d7a12a68a8bd8ffb206ce230c0a2b7ffa829e68679b975b3c2c24df643a54991de026d2ebc0514b4555
-
SSDEEP
1536:kfBz2/PktUlRo043F0ghNxgefN3MU39DMglNJfXwJ0:SZ043mgeefR9Dt+J0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4840 msedge.exe 4840 msedge.exe 1020 msedge.exe 1020 msedge.exe 1608 identity_helper.exe 1608 identity_helper.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe 3224 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe 1020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1020 wrote to memory of 1088 1020 msedge.exe 84 PID 1020 wrote to memory of 1088 1020 msedge.exe 84 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 3384 1020 msedge.exe 85 PID 1020 wrote to memory of 4840 1020 msedge.exe 86 PID 1020 wrote to memory of 4840 1020 msedge.exe 86 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87 PID 1020 wrote to memory of 2728 1020 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\54a58c4ef70fe7522d24f48e585bc557_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe3f6d46f8,0x7ffe3f6d4708,0x7ffe3f6d47182⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3587096750447307084,6625151497470975252,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2088 /prefetch:22⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2080,3587096750447307084,6625151497470975252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2080,3587096750447307084,6625151497470975252,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3587096750447307084,6625151497470975252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3587096750447307084,6625151497470975252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3312 /prefetch:12⤵PID:1480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3587096750447307084,6625151497470975252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2080,3587096750447307084,6625151497470975252,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5876 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3587096750447307084,6625151497470975252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5096 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3587096750447307084,6625151497470975252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5228 /prefetch:12⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3587096750447307084,6625151497470975252,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5052 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2080,3587096750447307084,6625151497470975252,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3952 /prefetch:12⤵PID:3216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2080,3587096750447307084,6625151497470975252,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5804 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3224
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4980
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
309B
MD54adb56d20057277f99aecd629d34ec4a
SHA10039e982fa145dee239a5fc56c14e42aad78dad5
SHA2566fbb4f9f50614e14016d57333e0d46862704c5a624b1ad1b991b136c51eb76db
SHA5120aa13423e4ebf60a02b3e6a56206044d9dbb83d7f893e6a17bcee74d01be50bd795555e084307e15a1358105a37473fbc91c2a4dd9c6d3f81ed3d1a3ef13e256
-
Filesize
6KB
MD5d9dca5c613d6fd9ca47483a326e2ec7c
SHA19d8391ccdec9ab9766c09868505a71220ebf7102
SHA25636146452f024342675812340b7501f9807da81eac93e47a7988dcb13dddd630a
SHA512b32f38dd990c242dec0cee4a1153b344f2b44d5ced8d4109c788fdf5baefb8830a45b3fceb6a2b83918d6c0b0102338629550e42f1fe52425361267472420d9f
-
Filesize
5KB
MD538c108f29203cb04853b009494b54c45
SHA1005d7a9dc4447f8a5d68507ab5c32d7a97c56b44
SHA25667e1321b12e7ec7b13da8ed3967477682baf782625ba1e606e235f0dae51db62
SHA51205c7c41f2d8c3430cf60c7bff8637df4e1f10caa9bf51219810db08e04c6708a3fbc1ada22a095c5adb37d8dcdf4be822a13b02ad34f0a2d6fa88ca4d5968ac6
-
Filesize
6KB
MD5de0dfbd340e11b1b2bc801d451cfe93c
SHA1166d293561d18e28a0ba691529b081984f146da9
SHA256bf6bcddaae00d928f991603f962fb63234f47e091fe6a85ca69cebece9caeafb
SHA51255c910363d2b9d7c7e4f2b9462edb855fea0f773d69eb14ec08cfc7dd3085b1a17aec5c176de61467e9a244bf36f00633845ca05b3f86f5b8f487c981c6be84b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c9757f858e7d07b5540a19560400068b
SHA1a4867b4516cee6a047dd7b176769740a21e05b0c
SHA256be65ca83603d430077c3fa41f9ae703fa6f878eea025b38b76ace48b8ba5416a
SHA51267dea523bb79336fd93c4be5c3e8a09d8182eedd2a91384633fe991377132d0577d11ff420d21127a6d3a9b21e2113186bcd90d21622f2a2b247bb559cf0d9e0