Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 10:11
Static task
static1
Behavioral task
behavioral1
Sample
56dcccc05ade75b216c66dad9f04d532_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56dcccc05ade75b216c66dad9f04d532_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
56dcccc05ade75b216c66dad9f04d532_JaffaCakes118.html
-
Size
8KB
-
MD5
56dcccc05ade75b216c66dad9f04d532
-
SHA1
00b1ac555402ccce6153b21e87f654138fa31716
-
SHA256
c0b02a6280c4baacf574b16ba1d356ec614e68629d0aa629d6a0d4db404d5cf6
-
SHA512
ae3a7595f3666cc8028c91c6b37b552265d83956a147f5508f15b961cb93eecd30e406e1f2a2bab96ed7519c43c5c749d8ea8c4b9079ea74c6344d369c70387f
-
SSDEEP
192:KJyZkong8lNMYn/QKs/fAll8kpk15Wfc62xQ8JieM+xR0B3XH35Eb:qyZ6Ekk8bb
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3068 msedge.exe 3068 msedge.exe 3324 msedge.exe 3324 msedge.exe 4404 identity_helper.exe 4404 identity_helper.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe 4672 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe 3324 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3324 wrote to memory of 2384 3324 msedge.exe 84 PID 3324 wrote to memory of 2384 3324 msedge.exe 84 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 2292 3324 msedge.exe 85 PID 3324 wrote to memory of 3068 3324 msedge.exe 86 PID 3324 wrote to memory of 3068 3324 msedge.exe 86 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87 PID 3324 wrote to memory of 5040 3324 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\56dcccc05ade75b216c66dad9f04d532_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd65c846f8,0x7ffd65c84708,0x7ffd65c847182⤵PID:2384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:22⤵PID:2292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2308 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2628 /prefetch:82⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3172 /prefetch:12⤵PID:4880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3200 /prefetch:12⤵PID:8
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4176 /prefetch:12⤵PID:3552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5388 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:12⤵PID:4732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4232 /prefetch:12⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,16161320701199858338,3641801078945038055,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1756 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4672
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4268
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
5KB
MD53c54c6e1c67f518ac8e37e2c749af8ea
SHA170cb0bdbe2dc815fc6413350734bea3bd61a8651
SHA256fa32c8118bf14681ee8ddb8bfc80c4ddb463822e6e5faf941668b89d4a7ac529
SHA5125f5b42b7c5f502691c3e44e9953f8f2c6c68febe2cabedac4caca429b94ac216cc039b78ff697fe6a3979c173ed4d682c50753e751e545ce474d0d3eb124ffad
-
Filesize
6KB
MD58ffe0b85c1420030b0d148d4d97a2914
SHA1e62bd34af3e7809b14338fe811ad0c83a99eb018
SHA25608b30b340ba44ff57afef51e12873017b2d2e208ccf3d6bc56b909fdb55d356e
SHA5122f7c7b7d8ab7076eca28df862f33e4cb8f4ba113fc48092a8d9ab4f27279e562695c4a9230d39158c92c14b60382503fe7fe90913ca460393c0080494d272426
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD5715d1a5201f5892e6681a7cc11e9892c
SHA1564965b061acb679647b85c77579dd9e20a83a99
SHA25615f4f0cde8fe59d6ac94a9d40e2f733254f3151b99d1a12f2853f5ff2839ac4d
SHA512600a87c6751bfb823eb3b75ed81a13b53a7073543aa35a59b9920c9991a9874d0d8be4e095658791b9010cf5e989bbac147204974076751f440fb7409871a92d