Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 08:17
Static task
static1
Behavioral task
behavioral1
Sample
826c19d18de31edace291c8d8c0fc68c_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
826c19d18de31edace291c8d8c0fc68c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
826c19d18de31edace291c8d8c0fc68c_JaffaCakes118.html
-
Size
85KB
-
MD5
826c19d18de31edace291c8d8c0fc68c
-
SHA1
90ee0ccff720fc6c85df39b769ff6a60ef470ca6
-
SHA256
9439b67798be51b12fd76de77da2cc50513b036d2ef44e0393359eb5fe07ea92
-
SHA512
70a3b458d7b39fbb52acc21f244c64991abf3990c768db8a3ff4c35da1d857f67ad9813786c1e2942d22883d9de0beebdc77093f9e9d3f8f5a5536ce55e1313b
-
SSDEEP
1536:w+ipVn1BUNqvLKvr7R/7nVOWCUMSo0mjiMpbqqvmznhKv++nPLB1VI:wBvLKvr7RpaiyuznhKv++nTB1y
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1996 msedge.exe 1996 msedge.exe 4464 msedge.exe 4464 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe 2468 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4464 wrote to memory of 3180 4464 msedge.exe 86 PID 4464 wrote to memory of 3180 4464 msedge.exe 86 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 4972 4464 msedge.exe 87 PID 4464 wrote to memory of 1996 4464 msedge.exe 88 PID 4464 wrote to memory of 1996 4464 msedge.exe 88 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89 PID 4464 wrote to memory of 5112 4464 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\826c19d18de31edace291c8d8c0fc68c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf3dc46f8,0x7ffaf3dc4708,0x7ffaf3dc47182⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,12040774288582517132,1704029057434217192,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,12040774288582517132,1704029057434217192,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2424 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,12040774288582517132,1704029057434217192,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:5112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12040774288582517132,1704029057434217192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,12040774288582517132,1704029057434217192,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:3088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,12040774288582517132,1704029057434217192,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2664 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5100
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1456
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
6KB
MD51b51c5dd1ce5decf9bb899a3b81de028
SHA160f85db32e686d229b5cf281ebe367c917959af8
SHA2565aadc26983d707b780189e8d2c4a98d591baece3421932a04449baf20659a6a6
SHA512a93dd375a08ff661c848df86d18f385f7f37a50c2be2891223718286fff935a66d6363f70b17ea7191aab171dee7f8ec40ecb23ba907c57234e09d033c890e37
-
Filesize
5KB
MD54a5600b2cf1a16c9a58c796c3a8532e8
SHA1b535c85628c8421bacd9df9bfda6f54a54e93b3e
SHA2569d55f4248a2ade768bc42692dc0d9d1313ae4a09db40b8a8000ac8420ec6c9b8
SHA512294e04e1288f89195f728dd865787a2273b18586465c6582eae77d48b870cfbc8626a5a12cda6c6a120842e7f38c739ae2766f50fe5450426eb69655a6b8aede
-
Filesize
10KB
MD5630be697d61dcee61d6d9cba15507329
SHA18ca1a456a4fa00f626df13beb4dcf0758d8bf9c9
SHA2565ba9882e01d32052e26fedbe77e5baa9a7c9bdbd00de2d641323e2aedf87bc0b
SHA512472af465f210abd5ee02fbb500b0f78895deb559545c74c2111895d3521b5673b3f994603f0cd11f8525904f4dff9d5432c0aa83c78f670f8e2708fe61d2a749