Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 03:46
Static task
static1
Behavioral task
behavioral1
Sample
5550a59d88f6bf61f87e471375ce50f2_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5550a59d88f6bf61f87e471375ce50f2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5550a59d88f6bf61f87e471375ce50f2_JaffaCakes118.html
-
Size
138KB
-
MD5
5550a59d88f6bf61f87e471375ce50f2
-
SHA1
9ed12f7d9b105f2f81ff44f109d5130ca1a48f2b
-
SHA256
5353802cc7fe0d9e46d67b0e2083bac90d3518e3d5850cac29a84cbd3f4f2488
-
SHA512
33ea45fdc286549d5ca6b7a97a7e7892129b737a99423c2decebcdb6b78cd833e2d32db6b73299192109f42b18f94bf4fa0efe8cbecd64380154595c653bab48
-
SSDEEP
3072:S6hDVi/jXL3/sDFhRc5y0UGTrgHtAXSk3ZjwfpfhvcfGCa4xMb2Ev3:SaDzOjrgNACYZjwfpf1cna4xMb2Ev3
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3632 msedge.exe 3632 msedge.exe 5000 msedge.exe 5000 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe 3112 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe 5000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 3900 5000 msedge.exe 84 PID 5000 wrote to memory of 3900 5000 msedge.exe 84 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 2704 5000 msedge.exe 85 PID 5000 wrote to memory of 3632 5000 msedge.exe 86 PID 5000 wrote to memory of 3632 5000 msedge.exe 86 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87 PID 5000 wrote to memory of 4520 5000 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5550a59d88f6bf61f87e471375ce50f2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffd1c046f8,0x7fffd1c04708,0x7fffd1c047182⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,8249087077418945913,4203302736344921746,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2172 /prefetch:22⤵PID:2704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,8249087077418945913,4203302736344921746,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2240 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,8249087077418945913,4203302736344921746,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2752 /prefetch:82⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8249087077418945913,4203302736344921746,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,8249087077418945913,4203302736344921746,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:5076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,8249087077418945913,4203302736344921746,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1292
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
266B
MD5d9b1f04bc5db503ae45aa524b454f4ba
SHA1703fc30acbfd6a795029c2a85c1323c688445bcc
SHA256c7935c2e71e9ad736655c8d83a9a19b76ee3e3c38873b9b2b58f85e51519ad29
SHA5128ef02d590aa5fee3767567ae0326cfcd37e97056ab736889b2486428b0dd806c984ec121147130889cb3533eba60219e0afb0e762d7556c0a5e16252d25fc901
-
Filesize
6KB
MD5d92dc4169b39232da555188eb314d6e9
SHA1c974ccfc80481096eedd660135af0e915db83936
SHA256608e82a812a0f5c6579c2833a85cfdb6d39b72905e41d4935704f156d2f44c80
SHA5124523dd5d4fd24c8c6ffd01dee1e5a660ee238067f342b547056d52bf195c568c13bc2620c968b451eea897486dad0c073417bd50ccc9c74cbf3d4c1da9ac5af5
-
Filesize
5KB
MD5c18b674f09ed41c0523df78007101741
SHA11295c0e897981738104848fd1b09bc278ceea741
SHA25612556a295b0f2812acd5beb2fe5a0d2d896c51323a0f512c6a479ede7bce9896
SHA512cd7b8dd8d19bd5dcaa601a144fcfece2bc1ce81af0afc9a95b034523fd20c67cdd92ef2f953f02fb2cb4b20112f42fe6e6cded67d80837272149ddcf3189354e
-
Filesize
6KB
MD56f88d6427b88b4c55c546b31ce684df0
SHA193ad32d576c1ed8fcb05edf737e9cd0c799af9cc
SHA256ece93fd4fbb77d92b0cbcf90479f613bd06148d529aab877e97bbe6e59fe703d
SHA51292a40745f819c2e7865222df2a94dd2e0b01b14ebae63892d1f4ab7b8fb1f80865e29c5616c19772af6f402330b0ce7b58078b91bfd3a0785387043e9acb65f8
-
Filesize
10KB
MD5bcc3ca433a313e20004c94fcc344d9a0
SHA1635af38042a30523bb7e1405c5158c95b4b114c4
SHA2566cd1413a073d56f26593d531154e27667c85867728382624b3746067d4133872
SHA512876b1636f90fb5c7f99ca66373416ad31c6dda54ebaeeaa490e5552451dfab2e95f8dae0ad43c532500c10fd5d7f920e670ed09681dc6c2ce4c8cdafe2c5d746