Analysis
-
max time kernel
145s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-10-2024 15:57
Static task
static1
Behavioral task
behavioral1
Sample
7fd6b2d81d4d0069398930149fa97c37_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7fd6b2d81d4d0069398930149fa97c37_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
7fd6b2d81d4d0069398930149fa97c37_JaffaCakes118.html
-
Size
170KB
-
MD5
7fd6b2d81d4d0069398930149fa97c37
-
SHA1
ff10b2d9541e133dc9b9360df1723a598626a68a
-
SHA256
37d83f9a51b918633ea3850bce80653eb804b6cf9fdc2d66b2f7b3e8e628f5d2
-
SHA512
e9dc686a884cc9e2d089f4d103737d7b44cbe3acb683ca7079c1190271e2f98083335be882a100f9ce6c7dea22b74f2cfd58882edbea5d0ae4346bd2edae2cfe
-
SSDEEP
3072:grChsQpoM5baEqQkZvk0fC4PwKlGPzx9r4ENuTtWXLGykJlQwmEiH9bhN081rx6n:grIsQpoM5baEqQuv1h8x9r4ENuTtWXLk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2856 msedge.exe 2856 msedge.exe 4076 msedge.exe 4076 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe 2972 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe 4076 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4076 wrote to memory of 2132 4076 msedge.exe 84 PID 4076 wrote to memory of 2132 4076 msedge.exe 84 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2180 4076 msedge.exe 85 PID 4076 wrote to memory of 2856 4076 msedge.exe 86 PID 4076 wrote to memory of 2856 4076 msedge.exe 86 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87 PID 4076 wrote to memory of 1624 4076 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\7fd6b2d81d4d0069398930149fa97c37_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbd38d46f8,0x7ffbd38d4708,0x7ffbd38d47182⤵PID:2132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,13842136302106189858,15305385873847804343,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:22⤵PID:2180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2028,13842136302106189858,15305385873847804343,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2028,13842136302106189858,15305385873847804343,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:82⤵PID:1624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13842136302106189858,15305385873847804343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13842136302106189858,15305385873847804343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2028,13842136302106189858,15305385873847804343,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1676 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2028,13842136302106189858,15305385873847804343,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1932 /prefetch:12⤵PID:3164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2216
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3008
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
817B
MD5e4074a0099ff915e75b4ea863d75cff8
SHA153bba42a12cc15e01076d46b6f3649ce61ce5ee3
SHA25660725135082f81825461a12d3ee325984ba581c9245bac4b41c87bd22a9fc890
SHA512c57b974c048f9788653dd8f63fa39d8495be005496c55245352a47df8c5153425bc8bab2b3cd6db79fa4ddc9d9dbf86cb2784a4ebbb31638e78050d8eeca52bf
-
Filesize
1KB
MD5fb9f4a5d5ee5ce37b9fb82ac3f05beb0
SHA18805a0d64564257ce64b9c4fa236c3d97ba364e3
SHA256a527ec327d7e566bbd38f189f818932760b80ee4379600fdd94b5c286bea5200
SHA51208f4085393c4ab80c4618f0b1a6a25d7dc5af65219b76337996a9f93d0e20a6d2b1fd2a1b9898fe6f5ae8a153a21e4b1b2b9bccce9bae83dfd4f746c633fab39
-
Filesize
5KB
MD54f04335fca92ce2c9544e84369fa4dcf
SHA17444c5f8995d089a0e4d97828f7df6626d5bd22c
SHA2562bee4d600ff56498c9a428ba93455216fa11a85070a70a4ae171e52d4aa156d3
SHA512b53a801cb126697c6ad794616d2dffbf2075669c0652a566a18afeb8c745915a4f619102d06a524f75a55ec4a2d21c47094ca4ed9953b2c8c75a48e9e182df88
-
Filesize
6KB
MD58f5143d67ca6f5e6a36502daea159f33
SHA1602422be4579b5493defe86e5d7091d7536d5c4a
SHA256f763fdd29950f2d762cb17ce4dbbba571a1bf0bbf8ebf55c4dea3d0edadec97b
SHA512c991ff254fe9ee10d7c9a19442fb734886c342c3a9b1188003cbabdb129bcc80388e88b1caf312db130bbfadd900134d9f77ede9d8d9b72d8ad94f83cea035f7
-
Filesize
10KB
MD5cb6b98c15e7705846a9cad23d8455f37
SHA1fc63f06cec2b0b86dd563995b16038beb8c30c4b
SHA2562b6b0c03728adee1db58d172ab8ce17ef09e3cad89b34e0289974756b2e20bf8
SHA512715a3f468ffee8bbb5df5084ed7ab691796be53d8d876fb0d7d7bc80410c77773790382cd133f9d92c5947b465ec62bb19e59cf54ebca7da79c2035ba9cfd3b0