Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 04:11
Static task
static1
Behavioral task
behavioral1
Sample
992085158a8d1d8f8fc3dfa202226f1d_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
992085158a8d1d8f8fc3dfa202226f1d_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
992085158a8d1d8f8fc3dfa202226f1d_JaffaCakes118.html
-
Size
155KB
-
MD5
992085158a8d1d8f8fc3dfa202226f1d
-
SHA1
80e3cac8ef08bd2e67c7b2a347b0495cc5d9a3b4
-
SHA256
8330d8036560ffeb0b72368e59631ee1ca615f4ba168c3e472c886e45e15764a
-
SHA512
9fa7af74a2ef278d4b2a56961a772f35914c24c02472af93b275874ba6c9a9cd712100612be512555e5b038ce1db540b9b089e3340dd7f9b63af75eb9e025511
-
SSDEEP
3072:iQuA/EOTG4yfkMY+BES09JXAnyrZalI+YQ:izA/xG1sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exemsedge.exeidentity_helper.exepid Process 224 msedge.exe 224 msedge.exe 4008 msedge.exe 4008 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 1536 msedge.exe 4200 identity_helper.exe 4200 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid Process 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe 4008 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid Process procid_target PID 4008 wrote to memory of 2344 4008 msedge.exe 83 PID 4008 wrote to memory of 2344 4008 msedge.exe 83 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 1908 4008 msedge.exe 84 PID 4008 wrote to memory of 224 4008 msedge.exe 85 PID 4008 wrote to memory of 224 4008 msedge.exe 85 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86 PID 4008 wrote to memory of 3132 4008 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\992085158a8d1d8f8fc3dfa202226f1d_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff998cb46f8,0x7ff998cb4708,0x7ff998cb47182⤵PID:2344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,11326915040526116744,16137854188542048076,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:22⤵PID:1908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,11326915040526116744,16137854188542048076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2248 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,11326915040526116744,16137854188542048076,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:3132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11326915040526116744,16137854188542048076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:12⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11326915040526116744,16137854188542048076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,11326915040526116744,16137854188542048076,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,11326915040526116744,16137854188542048076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵PID:3816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,11326915040526116744,16137854188542048076,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5212 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11326915040526116744,16137854188542048076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4944 /prefetch:12⤵PID:4492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11326915040526116744,16137854188542048076,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5076 /prefetch:12⤵PID:1416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11326915040526116744,16137854188542048076,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3424 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,11326915040526116744,16137854188542048076,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:2272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1192
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD58749e21d9d0a17dac32d5aa2027f7a75
SHA1a5d555f8b035c7938a4a864e89218c0402ab7cde
SHA256915193bd331ee9ea7c750398a37fbb552b8c5a1d90edec6293688296bda6f304
SHA512c645a41180ed01e854f197868283f9b40620dbbc813a1c122f6870db574ebc1c4917da4d320bdfd1cc67f23303a2c6d74e4f36dd9d3ffcfa92d3dfca3b7ca31a
-
Filesize
152B
MD534d2c4f40f47672ecdf6f66fea242f4a
SHA14bcad62542aeb44cae38a907d8b5a8604115ada2
SHA256b214e3affb02a2ea4469a8bbdfa8a179e7cc57cababd83b4bafae9cdbe23fa33
SHA51250fba54ec95d694211a005d0e3e6cf5b5677efa16989cbf854207a1a67e3a139f32b757c6f2ce824a48f621440b93fde60ad1dc790fcec4b76edddd0d92a75d6
-
Filesize
5KB
MD5ef611ae1837bbc8d375fa7881366d63b
SHA1a0bd7e1119101666ccd706286321ba7ad4087bc2
SHA256a06a7cabf443d4c699900ce969baf039bcf16b6a03b3e659f3794ecc87a8b832
SHA512ba6d719b35a9ace9702790d89943c125a624b0f974386a14ce8133bde0734f8b11e124331f68ff36d908ca837b4c90149e62bf02c5bc554392d624b4394e6d60
-
Filesize
6KB
MD5ee5d320c5baf687ad245f413e9ff3ea6
SHA1de6143a36fc879ba631fb2b563699473c26d8bde
SHA2562dfe4218719e7b103bceae27777654b4caf220f427ff8eea19837adf9f1081e0
SHA512344fc4cef510058344b342384af159548a8aac8657676709e4c90f76665b808cd50bbe3da5b3aa211a4c129cd9f9d72314b561e7ea77a18a28cdf0e41a64f793
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD55cee4fa9426dc27b7e207ac62119ad07
SHA16536e93557af6d1f0f390376385e3f3da2c5c192
SHA2561238b4e5a95b99a0665f01da4732e4840ebbeebc57e6155dcfa9f4793c280271
SHA5128408a0ae4a01d0397834d6dd74134599005e847f8e66eeaabf44c61374f345b981b2aff3554a7d47555dd5f57c19c3d2c5ad9577eed8020fd551be56ad77df7b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e