Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
5688681b682dde4594d66d4f266c6b63_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5688681b682dde4594d66d4f266c6b63_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
5688681b682dde4594d66d4f266c6b63_JaffaCakes118.html
-
Size
139KB
-
MD5
5688681b682dde4594d66d4f266c6b63
-
SHA1
e6cc98fe93416a2d21744163c8db540b121df84a
-
SHA256
d2cc00c8d5e9a117f83e5d139d10c646e6c53db85a3199e45af06142e43f7956
-
SHA512
1ee624b9baed656417b1e14f23d60c77b190034c963b289ea5024b552920e7f6145504f733ed5b3da09775d915b484e70f753e3429c822cbe788e21f2c539968
-
SSDEEP
1536:SEN9hhpmEMW03wlxSTyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXAZ:SEwtTyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1232 msedge.exe 1232 msedge.exe 4932 msedge.exe 4932 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe 2612 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe 4932 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4932 wrote to memory of 3900 4932 msedge.exe 84 PID 4932 wrote to memory of 3900 4932 msedge.exe 84 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 3684 4932 msedge.exe 85 PID 4932 wrote to memory of 1232 4932 msedge.exe 86 PID 4932 wrote to memory of 1232 4932 msedge.exe 86 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87 PID 4932 wrote to memory of 2288 4932 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\5688681b682dde4594d66d4f266c6b63_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb91b646f8,0x7ffb91b64708,0x7ffb91b647182⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,846172706961759334,17461318252362143056,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:3684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,846172706961759334,17461318252362143056,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2372 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,846172706961759334,17461318252362143056,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2856 /prefetch:82⤵PID:2288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,846172706961759334,17461318252362143056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:1844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,846172706961759334,17461318252362143056,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,846172706961759334,17461318252362143056,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2740 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:328
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
6KB
MD5d60208496d6bd199b1d6f5453f5644c5
SHA1ec71c47e382cc834a3b059f447f04bd23d939cfd
SHA2569c30c9fa36fd5e30757f61db6be2a98f97c3adc2ce786617b356ea26c0031512
SHA5127aa0c8964b3656bec26d0d83a9000efaabc77b185d3d21a9392d8a0417ef0e9f69bd0635a91a66422cccee8e7fa99de3c56ac6d43d7e6abb064e9f66b25e5b5e
-
Filesize
5KB
MD5baa58b9161aeb97cc70eab2fe00315c3
SHA1b3e192b67116dc068dcdb6c48008e3029041b1ae
SHA25656b0abc76a88d084d6151fbdf69fd3014c9bd21b3e4a9926e64f25c038cb61ce
SHA5125935280b47997cfd3e0712f98425bab92250a57bf84f99b26b1056fd73aeba48dcc0f7440077e2f887a434a0fc95d89d7b324677972eec556b802ca0fa0744ab
-
Filesize
10KB
MD53b38fac48d1748045aa1a165b555d788
SHA144cd189f4edd2d6964a2184b001c3fd1ba8fdc09
SHA256127fc5b71ebe8a426afa4dc897ce57f08980b11ff68af36247c77cf9509d281a
SHA512c557c3ab7ee23ed18971a2800b8d36aa30c86c24df79120f58c2bf2c76cbe40402b6e66a59952a7e448f226522f51dd7baa584d00c2fe1bf33f206c4edd5a74b