Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 21:28
Static task
static1
Behavioral task
behavioral1
Sample
9748f344763885a1aaccccc6ed0125af_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9748f344763885a1aaccccc6ed0125af_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
9748f344763885a1aaccccc6ed0125af_JaffaCakes118.html
-
Size
158KB
-
MD5
9748f344763885a1aaccccc6ed0125af
-
SHA1
2067c2dd42f477553d8e82780dbbfbb09f842237
-
SHA256
b1cc3783cbcdcfd490a3e08e6d4fbacd57f16559b2956348315929793abd05c3
-
SHA512
61a77a06e88689e67c044fcc585b8ca9f305c7bf62f21ed8a49f3dae63a8843965e29f7b19af3e9df0a2fb90a5c7371eba5e4a2c4790f048fdea940b19abe07a
-
SSDEEP
1536:iwRTxahp5JOphDP6yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3om:iaKnOXD6yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 1408 msedge.exe 1408 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 2428 msedge.exe 1836 identity_helper.exe 1836 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe 1408 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1408 wrote to memory of 3292 1408 msedge.exe 82 PID 1408 wrote to memory of 3292 1408 msedge.exe 82 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 888 1408 msedge.exe 83 PID 1408 wrote to memory of 4936 1408 msedge.exe 84 PID 1408 wrote to memory of 4936 1408 msedge.exe 84 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85 PID 1408 wrote to memory of 3436 1408 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\9748f344763885a1aaccccc6ed0125af_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffec9a246f8,0x7ffec9a24708,0x7ffec9a247182⤵PID:3292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,357997257612252133,14196893614864135030,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2140 /prefetch:22⤵PID:888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,357997257612252133,14196893614864135030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,357997257612252133,14196893614864135030,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2844 /prefetch:82⤵PID:3436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,357997257612252133,14196893614864135030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,357997257612252133,14196893614864135030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3324 /prefetch:12⤵PID:1628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,357997257612252133,14196893614864135030,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2280 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,357997257612252133,14196893614864135030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:82⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,357997257612252133,14196893614864135030,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,357997257612252133,14196893614864135030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,357997257612252133,14196893614864135030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:1812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,357997257612252133,14196893614864135030,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,357997257612252133,14196893614864135030,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:12⤵PID:1076
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2696
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
5KB
MD5246a97a65b3301a37c8178a03c8278a4
SHA106ff0ba1e057af394a3e6d0aee491b33242aa9ea
SHA256b7dee44265c56bd9d330f53e40ca1334455b4560c644a0351b11c1221ea473e0
SHA5122d0b3f89489257ff49c2499d9603defd1d20535013011a368045d95035906653f4e052281ef5939924fa84489952b96ae49e6f947bd02168a8963050309920f8
-
Filesize
6KB
MD5a8e001a327c594397e8ebcc6f74c09af
SHA1794cec7b29124b82d5800f4a7c81cfc4bdf726e7
SHA25657b6f0e588b9502c5eda01d744b68f89dccc77d123062d36049633c36f647e07
SHA512d868fef15602088aabca7f75789cd9251180c4641ca36d0ea2ec1f2d3349d819d8e352df00a863c4d934a4858a74f85a42b3e0edfd888c05695b491ad5690570
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5bb17181fc5c7e559602675a2ec8a45d2
SHA18ce65b339e5060592ba5bb66c9475b82e7f46914
SHA256cba99f58aa2126b3db40f97e2e912986c80476e85b424b3c904911a14b57185a
SHA51293a194bdbff19828519e8d6e3f42c1f625a808dfe7e22513a64822fed07a67ea5a199038d06f9531d3dadc1b493ef87d87c2e58a5b10ea3eb56e2422b3a57eb0