Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 23:29
Static task
static1
Behavioral task
behavioral1
Sample
9147cf1535e063369a834c3380a39414_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9147cf1535e063369a834c3380a39414_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
9147cf1535e063369a834c3380a39414_JaffaCakes118.html
-
Size
155KB
-
MD5
9147cf1535e063369a834c3380a39414
-
SHA1
3be6c1d4f33a645ceb708a06cb224f2182e5881c
-
SHA256
7e41514bc96cf636dd784ab28fa88ba73efc2cc28f3d7fd6d16c888692a16e21
-
SHA512
86627dd5b7cdf07d31522d74aa4f95859a677c5f6d9bfe674954247bb45d9fca703818a2b3a735161a69990a96fd4695eab4e49c45bb85e18e0ac150534673d5
-
SSDEEP
3072:ikdnrSf5nwkOXyfkMY+BES09JXAnyrZalI+YQ:i8rSRnwDisMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exepid process 3028 msedge.exe 3028 msedge.exe 4876 msedge.exe 4876 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 924 identity_helper.exe 924 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe 4876 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid process target process PID 4876 wrote to memory of 2184 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 2184 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 1768 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 3028 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 3028 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe PID 4876 wrote to memory of 712 4876 msedge.exe msedge.exe
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\9147cf1535e063369a834c3380a39414_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed61946f8,0x7ffed6194708,0x7ffed61947182⤵PID:2184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,1269776641383130950,8910069709650360793,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2052 /prefetch:22⤵PID:1768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1980,1269776641383130950,8910069709650360793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1980,1269776641383130950,8910069709650360793,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1269776641383130950,8910069709650360793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1269776641383130950,8910069709650360793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1980,1269776641383130950,8910069709650360793,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4860 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,1269776641383130950,8910069709650360793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1980,1269776641383130950,8910069709650360793,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6096 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1269776641383130950,8910069709650360793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4796 /prefetch:12⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1269776641383130950,8910069709650360793,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:12⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1269776641383130950,8910069709650360793,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2788 /prefetch:12⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1980,1269776641383130950,8910069709650360793,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6032 /prefetch:12⤵PID:2468
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:316
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1752
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
5KB
MD53e15ab96f48d45742b57bba8b1069001
SHA19f75b59c6b9ae7ff818f1a8151c7ef5e7b671b9a
SHA2560c7699a05ab24ca9f8b3c65dd2fef8b98d94a2069697434e4f3bd5c612a723f5
SHA512a021cfd1a1e01c20496fce57c1f17e64aa2e82dc56cb813856a3d7b96b919af7cee1d096d11a3d63cf13b82f71616c96a271e9ea3ea2ab8fe58d9c80e9c4ebce
-
Filesize
6KB
MD5b4b61f48a11d212f46619ba7e3572e70
SHA1601f7c7e9da03d6041f488c673518bc12c9a67fd
SHA256ef5da84562c018e058310233da95b407904b594fe9c3191f9a1de10af4506323
SHA512b48a38f2de9d87a735d565498b94fded4ee36fe4e4329951029d7e307948ae89340b2aa569fad1b94995c4f2c4df161fccfe68a9f520997f0410a6f545649918
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
10KB
MD5a85af3270719bef756a7a3142b752264
SHA112e6ad178a4d257408d5ee8dc2941342f6862c85
SHA256ab0c03b9f05d86a469fba5b8b87511fba0d418552d90b81fc68d4c40395d1964
SHA51211902db6f4c2d5413c48d4017be013ea8370369dc3f7a3b8f42ba19792fc1163503f06dfaec51d9d6b2b7f2e64c9110cd761e061455acf811b21c172bd0a712f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e