Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-10-2024 12:32
Static task
static1
Behavioral task
behavioral1
Sample
79a5a2236990aba4f1c9db782fdee62c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79a5a2236990aba4f1c9db782fdee62c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
79a5a2236990aba4f1c9db782fdee62c_JaffaCakes118.html
-
Size
227KB
-
MD5
79a5a2236990aba4f1c9db782fdee62c
-
SHA1
da94352a591d1e71658381fc7823a0fc6e9121de
-
SHA256
391bcf8e0ff0f26feee1e620b11793f1b9e5062e9d9cfd5838a5b39c08f4a2d1
-
SHA512
505bd005a525afb6ec834285d39f8c39f66651e3a66fa0f984827f20d119b00556fc72ce7d2c7f32a3bed1ed8e580cce0cdc4a0e1427a8236dbd21a2d5b889e3
-
SSDEEP
6144:l+RELVzhXkA3d8VZQvzwV2lms5JBpknvjXGXgcHlpKQL:ERELVzhXkAN8VZQLfh5JBpknvjXGXgcd
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4836 msedge.exe 4836 msedge.exe 3624 msedge.exe 3624 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe 4004 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe 3624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3624 wrote to memory of 3592 3624 msedge.exe 83 PID 3624 wrote to memory of 3592 3624 msedge.exe 83 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4040 3624 msedge.exe 84 PID 3624 wrote to memory of 4836 3624 msedge.exe 85 PID 3624 wrote to memory of 4836 3624 msedge.exe 85 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86 PID 3624 wrote to memory of 2448 3624 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\79a5a2236990aba4f1c9db782fdee62c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfeac46f8,0x7ffdfeac4708,0x7ffdfeac47182⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,10630738556726501522,2248519568642391108,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,10630738556726501522,2248519568642391108,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,10630738556726501522,2248519568642391108,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2868 /prefetch:82⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10630738556726501522,2248519568642391108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:4592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10630738556726501522,2248519568642391108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:12⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,10630738556726501522,2248519568642391108,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10630738556726501522,2248519568642391108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:1968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10630738556726501522,2248519568642391108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:1436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10630738556726501522,2248519568642391108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3764 /prefetch:12⤵PID:3404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,10630738556726501522,2248519568642391108,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5936 /prefetch:12⤵PID:1424
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4104
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
42KB
MD5101f2295c59a6c129b95bb68093aed06
SHA112f5843daaf99bdb874dfebaf10660c54ede2120
SHA2569b59525954d9da17ff56cac0c0cda55bb6c4df6b7550fe68565fe0d24a963ac7
SHA512f5e54b7609a1884253f1d05d9245def95b3721e1163ddabb6d32f5b31f824a218c60533eef25a6f91d8ae6fa314128ae258fdc341cf9a4f36bf378e874b5277f
-
Filesize
1KB
MD56d8e6c909a3bcc19c0746ba1ed977ab5
SHA1dbde1fce22b124bbdf2b0f037719a103ad9e8711
SHA256eee3dce44905d2e03bd3ca7889c710ca5480b9c2da6ece02bdc94b5c22950f94
SHA512a7f0eebe4961084857af3968c90acccd772dbf3098303b616ebcf64da69c03e27af8f6404ca35489deb9b618fbdc64337c3ecfeb602d4344d9327270ea023a05
-
Filesize
5KB
MD5c6403dd5a4dd7be064c4e58c6d9bcf77
SHA1fddd5f1f36bdd0def412465a84047a92ecb48390
SHA25627ac1e2e7d225be73494ebf5182dc6a3fe820bf8ec13dd7c45d03e9e924c6629
SHA5127d60df2b997a0e78f09c105ba55c2ee41acecbc28b82304881b8a940a06d1a74c16957e63501aa94edfb0550bffa49a44d48ae415d6d132aa1cb290ee8889e46
-
Filesize
7KB
MD551b1d4ab9e1a9518f14ab48ad92be9df
SHA144b9e24809d4ebcfe63122e125f480cb995b48b5
SHA256cf46e34c1956ff78a8a3a16d7c21b75e0787e2da3d99e7fdbad26ee24156be7f
SHA512c9d084b1496fa7fbe3072172d6478f228cdbdac71ff24621fa377dca0f46daab5fe40479e8c65ddcea586d39655f63456bacae1391da5f2a3da3cc26db15ad10
-
Filesize
6KB
MD53519e52ab7b2cd36415aa03a40892f5d
SHA1f4c57ba56cea6045314f666fc13f53a4a9d48390
SHA256a09127e5404a5f8b121e39f0e581d8ee66653d41931885cb836155d3e00cf8a0
SHA512db0ff19369cc2a5108b4f7186feec861aed7f54b2fe07d1235b98549787607f310260ce4330153f5aa67bf014c1f063b3e3e734b2bb0260745031bd0c5cb69c5
-
Filesize
10KB
MD5a2c430c9a324bf91fd9354819c2c2a90
SHA1b8332974cbb2b8599a0b7b175caf94a64b52e107
SHA2563f62b5a34d814c974912346e806de889b997085dcdfc1a87b79c7d26173f51bc
SHA512e0caa37ad579e8318efe8e15e5af1d7f5d8947ab15579b2daa865928124d4a968f7b25a379b3aba47945d42469e65d51d990a4613b38353d44296821a6f513fe