Analysis
-
max time kernel
145s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 05:34
Static task
static1
Behavioral task
behavioral1
Sample
55bae5dc927d7da11eb0534acf2b04d1_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
55bae5dc927d7da11eb0534acf2b04d1_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
55bae5dc927d7da11eb0534acf2b04d1_JaffaCakes118.html
-
Size
37KB
-
MD5
55bae5dc927d7da11eb0534acf2b04d1
-
SHA1
50935102cc132f0371dccaea06f0e56255f997f0
-
SHA256
5cb17c2d6ef6e8d337c3dcd23e151031ad46125dc4e503e41792ecd7010a27c9
-
SHA512
4280d413ac89bc22ffd8086051431abfa2658f8b00d0ed8b1438a1e8e3c237795810a47d87664f9156ab25e612b138809811fcee8166275559b7fc9ad0556f41
-
SSDEEP
768:w9W4pTfpNBjIq94xTpn+e2nZjtTseXjtTC5jtTA+aTKLtTC:wKpTX2nZJTPJTC5JTAtTKRTC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 208 msedge.exe 208 msedge.exe 388 msedge.exe 388 msedge.exe 2596 identity_helper.exe 2596 identity_helper.exe 5928 msedge.exe 5928 msedge.exe 5928 msedge.exe 5928 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 10 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe 388 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 388 wrote to memory of 3480 388 msedge.exe 86 PID 388 wrote to memory of 3480 388 msedge.exe 86 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 3692 388 msedge.exe 87 PID 388 wrote to memory of 208 388 msedge.exe 88 PID 388 wrote to memory of 208 388 msedge.exe 88 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89 PID 388 wrote to memory of 2560 388 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\55bae5dc927d7da11eb0534acf2b04d1_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe06a046f8,0x7ffe06a04708,0x7ffe06a047182⤵PID:3480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:3692
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2660 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:2560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:12⤵PID:4332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5104 /prefetch:12⤵PID:3084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5324 /prefetch:12⤵PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵PID:4312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6000 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5756 /prefetch:12⤵PID:2712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4204 /prefetch:12⤵PID:944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6412 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6388 /prefetch:12⤵PID:2276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,21511538435409340,12106527868414790985,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3016 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:5928
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:748
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
261B
MD5d2f8b39b1086950e53a306287d07a942
SHA1599d8bb493848a56072b06a2ac648ff72f65993c
SHA256d85ebe411c73386965f52ed818bc3679bc92999a04b3908996d4c4890668dc69
SHA512b52610e186f64ddf817686119dc09989129f902d2efc18d02f713a6b1e40241fe9580e2d4b6b9a86acbaaca25112cbb1121c2b66e828828a66283f0fc2e45c31
-
Filesize
6KB
MD5ab6a723e5827e242b0530d8e63805cf8
SHA19fc70eb59bee31edc21517e8998ecde53cac3b71
SHA2560f2963f712e72ad9521bdacfbac66d8dd6e2b3194b8deabb3b41085951058cef
SHA512dd70cef736198498ee7442e60b66d86965cb0954106f5dde5283d083b49e4f274042f7d9660f7451a1d574644260a5cac9bbd15197b52c97c7664546fee3912c
-
Filesize
6KB
MD5a4b0a1f059d03c1db48b4ac5da1fa09a
SHA12abc6287becf0b29662f8a54410a251c6793f791
SHA256c78b5fa7b5f35fdf3ec1e55af5393132e40ab3479b8c39426ea633c3ca72ef57
SHA51267926779b65dc6fca4dd0f8e7dc0ffdd4bc61c5b45942d23ff705c24aa9391c05cb97cd95ade7cd3c58b905962c73e5290c567ebe223dd81c28c9a9f808e4361
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD515f7886efb3575d42354deba295163e3
SHA12c13611990cf5048de53cccaa34631061f6e5266
SHA256eb024c6a7170cd0efc79f638f24de73da76c1db6550b4a4148747cd2110e752b
SHA512327f36b0ac78bebda8781a20c1a53be29dfe607b4d60fe7e4db28970c3bdf86671c4daa8dc7eb314daa32055f9b047e75cf10a71cebccb474e3a23dd70440efe