Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 08:25
Static task
static1
Behavioral task
behavioral1
Sample
82733161496114562061716d60a14595_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
82733161496114562061716d60a14595_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
82733161496114562061716d60a14595_JaffaCakes118.html
-
Size
214KB
-
MD5
82733161496114562061716d60a14595
-
SHA1
1a403b4a1d01dbf2ca9c20d090a55bad6ab6dad9
-
SHA256
671e7bcad9780fcd9630242c7dcf4cf904512358e2d610b9950729837a0b9511
-
SHA512
ee3ae6822967c6553e1eed707c97df78f3f014b19f1efd95db87e1512d5c6237598b7f9e7fffdaaf885614373a8a47d678c8ea6a4e0c31406bcc37b6329d5191
-
SSDEEP
3072:F1rhB9CyHxX7Be7iAvtLPbAwuBNKifXTJk:Fpz9VxLY7iAVLTBQJlk
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3076 msedge.exe 3076 msedge.exe 1376 msedge.exe 1376 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe 560 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe 1376 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1376 wrote to memory of 3636 1376 msedge.exe 86 PID 1376 wrote to memory of 3636 1376 msedge.exe 86 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 1712 1376 msedge.exe 87 PID 1376 wrote to memory of 3076 1376 msedge.exe 88 PID 1376 wrote to memory of 3076 1376 msedge.exe 88 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89 PID 1376 wrote to memory of 4212 1376 msedge.exe 89
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\82733161496114562061716d60a14595_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf3dc46f8,0x7ffaf3dc4708,0x7ffaf3dc47182⤵PID:3636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,7982863349550215143,5942248429113927910,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,7982863349550215143,5942248429113927910,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2204 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,7982863349550215143,5942248429113927910,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2968 /prefetch:82⤵PID:4212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7982863349550215143,5942248429113927910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,7982863349550215143,5942248429113927910,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,7982863349550215143,5942248429113927910,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1192 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:560
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
6KB
MD5cb687e64824132b9175a9ea9beb2d66f
SHA197a5de4b4c0efe9eaddd7427ff73eae8cb2fc7f9
SHA256ac05eadd6057fda99ee93afd2d50a32d79e83adb8c7fdde79471bd54e8a75b74
SHA5129fd135dabd9c01cbdbafd343852b8e376da1045f0a24ebdac3df67a9a4bb275f3c7de74d93c35fdea0af841d18a69b0b55b80e52915eef257f8e8b667bf85325
-
Filesize
5KB
MD57469f91e5a1551292c213bdd8aeb84d9
SHA1983e442a46225d46dfca9da4d1770ebbd106b4b8
SHA256d4bf501876255bbd43ac5608ebe99fe4145735d4e2db75919d1603f7b8f8d625
SHA51207234d50f672f6dddcac6e1fbfd9db40a4d6608d4081a4d385a2617ff253904ecabf170f6cf5ac4e39898b21c4eacd94b5edbfddd759c7b68976f56130297d25
-
Filesize
6KB
MD587e1d41a428b3f74648e3d19165f9444
SHA1fa5fd3fed6a5fb020881f5571d1ebe968f860150
SHA256fbac5c1b8378d896d098e85723b04c77c30961f8b5025b9b6b866b2ff4961ad6
SHA5125e2d459896a4dd0e6872983aa3adfa7c0de287ef5be226acad3415fc70f6c5734158129f639550a74b907e68c09cbf119471e3e7af7d7aa0c680e4cc33fad6b6
-
Filesize
10KB
MD5b758123acd249c201f45c51cf82fd279
SHA1c1608b5674d55e214b9ade9a5bdd43047d71a460
SHA25657058145b32ee5a2dac8c27440146a49be7f7fecc0cbd45f5563ce6c7fbe899f
SHA512234a6325ac60f2e0369317db303e3fd8e1aabd247e70e040544c1df7698dda2bd4e6ce2f095641d48606a27b59a016c577ae9e6ef24005f813438b51b2aa3d77