Analysis
-
max time kernel
139s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 10:36
Static task
static1
Behavioral task
behavioral1
Sample
9af486a4710384a187ed8c1e74767edd_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9af486a4710384a187ed8c1e74767edd_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
9af486a4710384a187ed8c1e74767edd_JaffaCakes118.html
-
Size
158KB
-
MD5
9af486a4710384a187ed8c1e74767edd
-
SHA1
b0bbb1d04db963342916bf6dd4b313f5deb7b1a9
-
SHA256
6167a38787269762f51efe797b48c0b75ec0094d622cd48ad06c046c1c083b9b
-
SHA512
41f860ece413461c1df820b6587c7c9b9d2230d3b912cb023b3a5b114a2c356068aad3f8376fa77aa4e8c35047efb7620120da3e0f66fdfee3ccf90f5022853d
-
SSDEEP
3072:iwIUN8s/7yfkMY+BES09JXAnyrZalI+YQ:imNLesMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3704 msedge.exe 3704 msedge.exe 3308 msedge.exe 3308 msedge.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe 3860 msedge.exe 1960 identity_helper.exe 1960 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe 3308 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3308 wrote to memory of 2708 3308 msedge.exe 84 PID 3308 wrote to memory of 2708 3308 msedge.exe 84 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3008 3308 msedge.exe 85 PID 3308 wrote to memory of 3704 3308 msedge.exe 86 PID 3308 wrote to memory of 3704 3308 msedge.exe 86 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87 PID 3308 wrote to memory of 1832 3308 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\9af486a4710384a187ed8c1e74767edd_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff81e1e46f8,0x7ff81e1e4708,0x7ff81e1e47182⤵PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,12187079877686153550,3285230810930950613,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:22⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2196,12187079877686153550,3285230810930950613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2196,12187079877686153550,3285230810930950613,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:1832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12187079877686153550,3285230810930950613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4316
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12187079877686153550,3285230810930950613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2196,12187079877686153550,3285230810930950613,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12187079877686153550,3285230810930950613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1184 /prefetch:12⤵PID:4432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12187079877686153550,3285230810930950613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1188 /prefetch:12⤵PID:1476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,12187079877686153550,3285230810930950613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵PID:2460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2196,12187079877686153550,3285230810930950613,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5712 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12187079877686153550,3285230810930950613,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4136 /prefetch:12⤵PID:984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2196,12187079877686153550,3285230810930950613,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3464 /prefetch:12⤵PID:3192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2848
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
6KB
MD528065c225f789964225fe7bc39047eff
SHA1331e8de6dfcef69adadbe101ed2834247db2598c
SHA2561494ab150938af8fe02182d512c2a078c59d9a853211c34d503073780f359082
SHA5122f71e11eb7d4223f453b93b269b83c1e189e952c2d112ed159a786215ab9c787d800fc5867c37bc17c41346133ac929e6584653bed273a55babfd34966e1795f
-
Filesize
5KB
MD515c05c98c89c17d54b0437f5fcaabcb9
SHA193e1ee3d412571ddf140803567d6583b266b00bb
SHA256ed331d1b2bfa9cf968e9d91b07ae3f6f4cf3e29fc6fc3b14a94193ee9be9d212
SHA512fafe933b25d62c6c15efc2bdc51f7b14a8e89152e93f7efbf5d89e8d0e9faa0ebdb0dec37f53623b85658de901fa2de19840ba8f3a8c9b4cc7c087c91832fb97
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD57b4bbc6aa481cc712066832e7bea57a3
SHA1ce72614c6238411bd8b1549d39158810ef25d4c3
SHA256d46bc0582fc614040d93b75aee0bfa6ed3b978a644a42f63165f20d9c67766d2
SHA5129cd4420e504ac5a47fba73067fe069e121d88a658292852a5f3f5425adc312ff3c9d21ec799481bda48c177ba552509d07152df32e7a78cc4f5d79ada9fcd660