Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 06:54
Static task
static1
Behavioral task
behavioral1
Sample
560aa216f48f3d92ccb691357eff9ab4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
560aa216f48f3d92ccb691357eff9ab4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
560aa216f48f3d92ccb691357eff9ab4_JaffaCakes118.html
-
Size
79KB
-
MD5
560aa216f48f3d92ccb691357eff9ab4
-
SHA1
07610d47a05da0b215abfe7a7f2335833c1701dc
-
SHA256
6100c2ecea710e30dfb1a659bed609ba875ed138b5e14d0a23bbb4c03a4f1d8a
-
SHA512
94c60999ac341c19cbbd63cf88aba604990482e97c7e84c225277de024ea6adbee07526b4919b50bf070ab3f45f8810d2aa8b945cb4e0919b82485a6e588ed10
-
SSDEEP
1536:sYGw4IDhqCOKyPedjFi4o/LzM+W3tyOSFPqyFbSUQmeF6OpdrT2hJqaQ4WGjdBOG:sYcIbclgtyOSNt+HuqL4BjdBO9ZttJ52
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4328 msedge.exe 4328 msedge.exe 3812 msedge.exe 3812 msedge.exe 1696 identity_helper.exe 1696 identity_helper.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe 3812 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3812 wrote to memory of 5116 3812 msedge.exe 84 PID 3812 wrote to memory of 5116 3812 msedge.exe 84 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 1100 3812 msedge.exe 85 PID 3812 wrote to memory of 4328 3812 msedge.exe 86 PID 3812 wrote to memory of 4328 3812 msedge.exe 86 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87 PID 3812 wrote to memory of 2072 3812 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\560aa216f48f3d92ccb691357eff9ab4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff9105146f8,0x7ff910514708,0x7ff9105147182⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,7461738762745600691,4927279412842203196,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1996 /prefetch:22⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1992,7461738762745600691,4927279412842203196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2524 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1992,7461738762745600691,4927279412842203196,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:2072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7461738762745600691,4927279412842203196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7461738762745600691,4927279412842203196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3436 /prefetch:12⤵PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,7461738762745600691,4927279412842203196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1992,7461738762745600691,4927279412842203196,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6028 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7461738762745600691,4927279412842203196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4804 /prefetch:12⤵PID:2416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7461738762745600691,4927279412842203196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:3220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7461738762745600691,4927279412842203196,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:1748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1992,7461738762745600691,4927279412842203196,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4052 /prefetch:12⤵PID:516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1992,7461738762745600691,4927279412842203196,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4872 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c6150925cfea5941ddc7ff2a0a506692
SHA19e99a48a9960b14926bb7f3b02e22da2b0ab7280
SHA25628689b30e4c306aab53b027b29e36ad6dd1dcf4b953994482ca84bdc1ecac996
SHA512b3bd41385d72148e03f453e76a45fcd2111a22eff3c7f1e78e41f6744735444e058144ed68af88654ee62b0f117949f35739daad6ad765b8cde1cff92ed2d00c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD53fe9ed4f5b0e6697cf0466ee03ff4618
SHA13c61a2744202c0e8647cbfff6e4796b337bd2960
SHA256f200f4928a51bf51fec48df273a55232c1d025b608f3d3f434463361c490bc35
SHA5123ccd909a757f5501b7d3084fbd7368ffd6b281b36121e716b5be6a4c48774a8d64601dff4ae05444ed9682496244020454e7f460473fb02460e245ea6cef889e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\DABA17F5E36CBE65640DD2FE24F104E7
Filesize276B
MD5deb032685464ba318e7d7f5966f4189a
SHA182c7c0020da764dc14fba1769b534554865f8c40
SHA25681d9cdac92e10b3bd0d59bfbd4d3b5812c3b2adbe1b5fd8553a70bb46eb34e71
SHA512e68556b519f70c3bf44299079bb76cbbec930a7b34cecc5b2b3f33a6f8c4ef20324a57b2b1d5d3af51c148d2bad358e24d75881c00a5dc70f36c6b87ede85aa1
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
1KB
MD5c5abc6244e28b7661a532737cdb2d84e
SHA15bc6febf2102a89919ce84323c8d9aabc6b4cc99
SHA256d7325cbb0ce2ec585c4b02565525c2c5e73595699ee3897116f7e76bba00e6bc
SHA5120bd4a8eaf3c76b01905ac6e42dd65171d9a733f9e273bd3eb4704f6333b25293e5dc01753d8dc465581e47acc9e4a2fe194bd86d73ce519d2c04bde3b48edbe2
-
Filesize
5KB
MD5cead4cdf69329beb9665cb0fc2de504a
SHA181b32192ce765c01e67c26db228c00928a3bb7b9
SHA25657f13d52fa3cb58689e2612c01e2d1aacabbc82e6e5569a335631e30c612b080
SHA51292e463eef183063166341a659feaa4eddc7ceba119651e485c88e47b2371408c620bd47300f3e9daaced7b346c3f141f835eb94aac95dd388e9e2efc843f6f8b
-
Filesize
6KB
MD5c3e044f2b5fc5457ba69920e6dd4ea85
SHA1a335d185cb33d2ca1f7967b180999045df30942d
SHA256756aaaeaac0ce8e89a534781b5bf2e23d7a74449a311a8e8d0d22126e5fc2ccf
SHA512c099d6ba0cd32e315c025d5045b152c9ff51446386d96e1c2020100fa7ef318e00e98a23e9d23e85f2a859ce342c12406583897ea401e4126e0d350101fa0f9d
-
Filesize
6KB
MD52d1ec4b942387d79031ae6b030457359
SHA16c3f8ed8487cc9e7882cfe86f201749a78440520
SHA25642c03fd9223d9e57f8fa8e6a01e4904803cf5cb3c7ed0e52b3d4334a9c49e6e7
SHA5120a058fb256a933b87d2e8fab5876c64fa629aee8822fd46a718809c9eb8097290ce77d3d692ea7b1f47d8870f6db07e46077d1e32590fe374fb5e3bf4b18523b
-
Filesize
6KB
MD5b20995ca4f66236f0b30fa127626ef79
SHA1b2f89f43d8312bb47416609369c69a87d90fe847
SHA256b260d800e0b3114b1b81f66dcf3eaf07e6c66039e77e454bfadb07cdb44a4078
SHA5125787fa0b20d8b2c445243c24ac02ae4dade129c9730b006c0c82db873562112c17c6c99ab15c9efbb33e069878e06cb2ae64d69cc5f855bfb5d8595abf05204e
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5b86fc2129026c0aa6875ba35c9be3e0b
SHA1056c5e9f858b48ecae584070aeb66ad4ade228c8
SHA256692bca53cb5e07c4eae03c8432a134aada3cb64fafec959566ba8c694bad0940
SHA5125d7bf8486bd7b1cd2996ca14ae8ec896975c0f5fe1a72e78d924ad36c28df6eb3354688668e1db8786156308a92256d05edb985aab0e6c1f7df55703af415d7b