Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
826b71f6ab659933811d5280f4bf0b33_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
826b71f6ab659933811d5280f4bf0b33_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
826b71f6ab659933811d5280f4bf0b33_JaffaCakes118.html
-
Size
13KB
-
MD5
826b71f6ab659933811d5280f4bf0b33
-
SHA1
bbd820570a3d31d9d32938484120262719107a48
-
SHA256
29e446a8ef27bb6c7a38b04cac3cbdbc3da94c6d76e332c13e532fdec780bc58
-
SHA512
0e9cbf85e5190764047bafa29b35080ca038f78aeb3fb26e45408b1ccf910cb97eb058d4ca863be5da28c73216fa225fcfd4a534a6db2956fda45003d69d9410
-
SSDEEP
384:ln8uqnGDnW0qJ4j1Osv4fJS7jy6/fCyVaOrCLnGjNgqx5lGA7Rpi8Oo1ysWmGekB:ln8vGDnyz53
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2828 msedge.exe 2828 msedge.exe 880 msedge.exe 880 msedge.exe 2552 identity_helper.exe 2552 identity_helper.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe 4532 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe 880 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 880 wrote to memory of 668 880 msedge.exe 84 PID 880 wrote to memory of 668 880 msedge.exe 84 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 1320 880 msedge.exe 85 PID 880 wrote to memory of 2828 880 msedge.exe 86 PID 880 wrote to memory of 2828 880 msedge.exe 86 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87 PID 880 wrote to memory of 3276 880 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\826b71f6ab659933811d5280f4bf0b33_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa99af46f8,0x7ffa99af4708,0x7ffa99af47182⤵PID:668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:3156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3332 /prefetch:12⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4260 /prefetch:12⤵PID:1448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4948 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5768 /prefetch:12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4632 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2092,17282703837045434109,10196398338229560860,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1856 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4608
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
276B
MD563e94862b42530f86676ad4d8dad984d
SHA13fd2230f79711e641c7d8bc1fc8f6d671319aec8
SHA25602bd271fbf1d8f8cfeb229ec24d7bfb1c261116853c2e66a3f5d0b3536f59a25
SHA5128f57ba1d96f3a97a7867f7eb43efd22baea3a78766fd88e87affcbc1e2e1699de833cbe9d78d22fa784ebf9602bd2006ee315ea13aebbcb79b56ec137c7a5aff
-
Filesize
5KB
MD50b3aa5866a3e28940342683b37155017
SHA15c3f669efb651b64bc3e9814ee7b6920a15ade74
SHA256d9f7a03aa200753405a313b159393dbe8ea8da64d682b41684b5052693be3d98
SHA5124c8fcf526c74baaf03fad90d690ec1e962f2af592c54379b052b65a053ffc518cc38fe3ee91dd79abf5ae88a322416c0ffb23e8c3ba2a9af1f3773913ad3ef34
-
Filesize
6KB
MD58a647061dda5b506811b76974cb82e4f
SHA1c79b988aff94d12644d2222c6d57962d296b4f64
SHA2565205ab03ca95fa5a6c82483408c5296fa54640c11d54b80069c2ead56288bde0
SHA512d9aa43a7b00ebb7fbd9b24850e3fbb0d2143b26b9afde0dd0a1cd6154b86ceff6761d13ff7b03f2bdf1bcc96ce596ccc2dfd0f2bcdddcaa3ae4ced7c8e9b8e67
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5b4c4dfa2451e5cf5195cb01a38d768a0
SHA1989b02042aa5d925f029de5eed5a81311eaebb28
SHA2566d442d0908bc449b47edc9046146d968589cd8a508b173d69ea5b0eef68d24ff
SHA5124883d1f1ffee61b31c10444272abae18a168dcf1a07e0728d07f235b8f3b02752f06b4a689c6a2b014f6184a982758d9a772aa0e7045acf4fe95551f4bfd15fa