Analysis
-
max time kernel
145s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 06:08
Static task
static1
Behavioral task
behavioral1
Sample
84dda0c259ccb937ae2d2db839dbe0f4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
84dda0c259ccb937ae2d2db839dbe0f4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
84dda0c259ccb937ae2d2db839dbe0f4_JaffaCakes118.html
-
Size
205B
-
MD5
84dda0c259ccb937ae2d2db839dbe0f4
-
SHA1
10221c1fbc6b09dac6d2ae447a17dcb993655d44
-
SHA256
b3032b5365cc60c5d8efbd38bf5b68f935d58ffabe5b6251d67d08cf8f16f9a2
-
SHA512
20843626172b73d02b7b9298c9d6bb037a426d89cf18282d75e4350ca3d3b2200568a8c80ea659727c3b8fd7924fcee2a24ccdf4c23ff2f3a36b32fa082fe1ea
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 3436 msedge.exe 3436 msedge.exe 2228 msedge.exe 2228 msedge.exe 1292 identity_helper.exe 1292 identity_helper.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe 2272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
Processes:
msedge.exepid process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe 2228 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 2228 wrote to memory of 2952 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 2952 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 5064 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 3436 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 3436 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe PID 2228 wrote to memory of 4328 2228 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\84dda0c259ccb937ae2d2db839dbe0f4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb77c846f8,0x7ffb77c84708,0x7ffb77c847182⤵PID:2952
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:5064
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2896 /prefetch:82⤵PID:4328
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3188 /prefetch:12⤵PID:716
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:2308
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4180 /prefetch:12⤵PID:4012
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵PID:3288
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5148 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5292 /prefetch:12⤵PID:2252
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5308 /prefetch:12⤵PID:4092
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:4604
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:12⤵PID:4448
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2132,14724097612244245450,6940899723202403940,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2232 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2632
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
5KB
MD5413da7e354ac2e34779acdedcfc73db2
SHA19e54f54ea42d5c43190d8a77adbd45da89332cc0
SHA25621588e4fc59068d1db660c57adbcf1d90f6b533c974544046511589d048ef768
SHA5124def8c9091887f85a36bc8fc824d30d4f5f7ce242cc1abbb542373f79751fd842761382fd9331b5d5810089fb10a2f385d3faf0e0e86cb21a3a0d87ba548b87f
-
Filesize
6KB
MD50d5e1e453df74be24ca3e896681273cb
SHA176dd45550113834b618ed7fbdd301df1ea220462
SHA256ec6d853b85d567a83c3233e4a4725a1fcbbd162010ea062705d6bcebb6a41196
SHA512fa6e4f09e1bcea2d0b27b0a77c2ed811ebfae7c5308d15658ef4cb39e30aed21371994952f294d4c087bdd462449c07ef481a7de35a5ed5ffd5f46c7eefa546b
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD57b0911d287faf6baed7b803ff2b03742
SHA1ac3291e419ec515c49a02b19bfea443310f54386
SHA256ff67f9c459be99467410f4ffd70b3d4b4b09fa1125eee8216e9da0ab4b0dee4d
SHA512ed1cf67b16bbdd948b14a8c85a282d3441e669f9ab4e080e043a010d9de59685e8fc59b12b7a52ec655ebf0378794cf4c93bdda8595b601ca2bd577c35acf5f9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e