Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24/11/2024, 05:31
Static task
static1
Behavioral task
behavioral1
Sample
92cc9f431797f75cb796d5664e5d2963_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
92cc9f431797f75cb796d5664e5d2963_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
92cc9f431797f75cb796d5664e5d2963_JaffaCakes118.html
-
Size
191KB
-
MD5
92cc9f431797f75cb796d5664e5d2963
-
SHA1
4fe8dbe1e0d1cce56501b6c6948e6846b7c33f08
-
SHA256
e0239b2f3b079c3dc73c0b1277b7669d2ec7f9e7db3ec75c42166fada8e2643d
-
SHA512
17504a5cb6213b5c0528262dd13c40dac2e8ad3a7d39b417fb8b6b6f9b9e339696b468e9938aab465f3730bd97fa494e608b9adffa9cf4003bc999174aa5b58a
-
SSDEEP
3072:KNM/5xl9K3d8MecQaFwSUwSyfkMY+BES09JXAnyrZalI+Y5N86QwUdedbFilfO5q:KNM/5xl9K3d8MecQaFwS5sMYod+X3oIW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5072 msedge.exe 5072 msedge.exe 5080 msedge.exe 5080 msedge.exe 4888 identity_helper.exe 4888 identity_helper.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe 3220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe 5080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 1232 5080 msedge.exe 83 PID 5080 wrote to memory of 1232 5080 msedge.exe 83 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 4144 5080 msedge.exe 84 PID 5080 wrote to memory of 5072 5080 msedge.exe 85 PID 5080 wrote to memory of 5072 5080 msedge.exe 85 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86 PID 5080 wrote to memory of 5024 5080 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\92cc9f431797f75cb796d5664e5d2963_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff95bb446f8,0x7ff95bb44708,0x7ff95bb447182⤵PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7351692827545736733,18204758354720453678,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2080 /prefetch:22⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2068,7351692827545736733,18204758354720453678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2420 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2068,7351692827545736733,18204758354720453678,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2908 /prefetch:82⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7351692827545736733,18204758354720453678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7351692827545736733,18204758354720453678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,7351692827545736733,18204758354720453678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2068,7351692827545736733,18204758354720453678,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5804 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7351692827545736733,18204758354720453678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5028 /prefetch:12⤵PID:4744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7351692827545736733,18204758354720453678,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:1020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7351692827545736733,18204758354720453678,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:12⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2068,7351692827545736733,18204758354720453678,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2068,7351692827545736733,18204758354720453678,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1196 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3956
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
5KB
MD56a70cbe316aa3bfc585f3f6ae945b027
SHA1b0ef9696e5169d46ece2d15dc27d15a4cae7fc79
SHA256959057aa247271ad23053270c4297ee0412298f4ee706d1d945ee0715c16f368
SHA5127d7ba853da58c80a1e8ff6429b37c53d8eadc872e06b64d05bdc8f891e76838c7ef6f76c1c70d0fde8fec17c29d30cb8b5e78d7bce60985b2b6374bd68f5c6d1
-
Filesize
6KB
MD5a77a98136be45bfc15943ac41023dbcd
SHA1c2d1a67714133a70622f95ca7901b305cc303079
SHA25603de44c4712862e179bbc2a416f9150061d347dc196ab194ec52ee1d2f189873
SHA5126167328298ec73802e14585f3345be2d3bbd1629063510aec72d1fd5441b294902d2764972a207d9a4715b84d680a00578a8c246e1c706d763dc84b14b747991
-
Filesize
6KB
MD50d62a3b42ed8f163a90a972ef5981ec3
SHA150732559b207ba736e362f609110b2c6bb27fb41
SHA2568e9b7c8e84ffc6c1e39962953e1fe915b720151ae0aa4547fae9b1f7e30be149
SHA512ccda78a596330e2a1bd22158b944a3612e5e23bac281ba0118b1aad271108be374fabf75a192464c300b47fa472e0f83af449418038b82c1712c7b5c1d1e4f63
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD5435dc1c8192d077807ea797681d3db02
SHA1755eecf363d93d9edfe3d5992f21c6404e571f88
SHA25668736a05f2a1108173ec469455dcbd577c13b2d16e84270dc8a5768e9d67a947
SHA512fa4024c9f21cecfba6127b8d040304af4a32b9a82adc201e1ed579fd9eee4a85a59828944445c1f38897cfcc23c251fd446f62007ef2d5d3eb09fc65ed252d59