Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
9982a79d39e18db3618b838449153a1c_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9982a79d39e18db3618b838449153a1c_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
9982a79d39e18db3618b838449153a1c_JaffaCakes118.html
-
Size
47KB
-
MD5
9982a79d39e18db3618b838449153a1c
-
SHA1
e9769e0c96cf8292609f5606b5758ccd2ae68754
-
SHA256
b57da4d4d759190e9b08e7d6f91f228bb4a912001216abcee355235cb229fd18
-
SHA512
276c473e6c93527d395fae7125281b9fff847a97bb833e2ad27945343df302e9b7097706b1510da8f5077e34806bc240e5feb2a51a30de42b3490d1c346d6d8e
-
SSDEEP
768:pDxUtUKuIMkUn2sVwUc8oUUU0UY2BQQpTU4QkDUqQ2UrQeDUpQkUJQPQU1QAUUQ8:ptUtUKuIMkUn2WwUAUUU0UY2BPUuUuUC
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3048 msedge.exe 3048 msedge.exe 5040 msedge.exe 5040 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe 4072 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe 5040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5040 wrote to memory of 4944 5040 msedge.exe 82 PID 5040 wrote to memory of 4944 5040 msedge.exe 82 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 2064 5040 msedge.exe 83 PID 5040 wrote to memory of 3048 5040 msedge.exe 84 PID 5040 wrote to memory of 3048 5040 msedge.exe 84 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85 PID 5040 wrote to memory of 2736 5040 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\9982a79d39e18db3618b838449153a1c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdfe8646f8,0x7ffdfe864708,0x7ffdfe8647182⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5888004352815450031,9574980615066608265,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:22⤵PID:2064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2104,5888004352815450031,9574980615066608265,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2104,5888004352815450031,9574980615066608265,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:2736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5888004352815450031,9574980615066608265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:1064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5888004352815450031,9574980615066608265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5888004352815450031,9574980615066608265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3960 /prefetch:12⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2104,5888004352815450031,9574980615066608265,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5112 /prefetch:12⤵PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2104,5888004352815450031,9574980615066608265,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4736
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
539B
MD5f3ca2cf29dd047fc86bc7766b47e78b0
SHA1fe39f432307bd6a8cdd3c6e2917807a2301a96ff
SHA256c490b35b7eb0ad1c81ca966470ce9806e7111e22c8df2eb2dad666ef5d6951ed
SHA512c6f71bece26fdbd7ed04e07010792d80e64b4646ecb1166ddb2428154aaa083acc248dafd1180ee01c995d8a5df353937a5532f31a33e8d737df96d12fc50cd9
-
Filesize
5KB
MD50dd312e58f02514ae522bc09f5e1537d
SHA149728a1e6e5381db389366d67cabaad6de9a69e2
SHA25680c80eb3e7ad3d880126fe541d0e1de1ce97fc6bf8936d340aff7a72cab90c6a
SHA51258eee4ac8a964d8fcd3308f6eb7b50cb8772a6a8262f34e687af15278ffa9c2d576e27f5000de6a697239548865ab11f3eb7629379a06b86d07b560044554d72
-
Filesize
6KB
MD5516892733dd1c2b48146c3706902b55a
SHA19502a4697f049b77b070ebadbc20bb81b5cf807e
SHA256bfc54580171f0b27161970fdab4796e5a762ca9cdee90a1bba468588d2c4bae2
SHA5120433c2612f61a9d5b42cb243e7dddf4b04d8e07ac04f95f1cc2e0636f1cfc0c73d24f74409ce715da55874befb46469bb2733fdff5b19618461eaffacfc681d6
-
Filesize
10KB
MD590a8ab640cf161f22be54176395e0889
SHA1917f14a68fae475b9dd623c475c37ac23b304ad0
SHA256831053fd934283f459727ddd1e8e5803eee916bc86f38bbcd10864bb544d1167
SHA51210e263cad3b579a8aa1414142f73b0028ce993f5a2ae8faeab0884c3b01422b47b031e3740ac12c53307dee223c2889a9f29d8494e63e53f7282ee67f2202315