Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
9b914d351fc7d569e916d8c97373ddb2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9b914d351fc7d569e916d8c97373ddb2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
9b914d351fc7d569e916d8c97373ddb2_JaffaCakes118.html
-
Size
159KB
-
MD5
9b914d351fc7d569e916d8c97373ddb2
-
SHA1
b4846bdff7ac01e68e25dbc7bce9463beb83602e
-
SHA256
5b220c283945620f5e25efdedbb1e2f3a23b9a300b4bb56e2bbe42d42b25136d
-
SHA512
67e5fce8e324f57fa707568b913a5354a5664e1155c8c106426da7077df6f90359bba5f2bc409657885ca220462ccac8559b59e53345003f7a63327624f7f486
-
SSDEEP
1536:iPRTL4Ct8A6wOlgEnyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3p:ih96wOnyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3152 msedge.exe 3152 msedge.exe 3028 msedge.exe 3028 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1220 msedge.exe 1668 identity_helper.exe 1668 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe 3028 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 3432 3028 msedge.exe 84 PID 3028 wrote to memory of 3432 3028 msedge.exe 84 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3668 3028 msedge.exe 85 PID 3028 wrote to memory of 3152 3028 msedge.exe 86 PID 3028 wrote to memory of 3152 3028 msedge.exe 86 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87 PID 3028 wrote to memory of 2176 3028 msedge.exe 87
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\9b914d351fc7d569e916d8c97373ddb2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffbbcb646f8,0x7ffbbcb64708,0x7ffbbcb647182⤵PID:3432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1728883140412595300,7353333925740891270,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:3668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,1728883140412595300,7353333925740891270,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2320 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,1728883140412595300,7353333925740891270,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:82⤵PID:2176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1728883140412595300,7353333925740891270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:3960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1728883140412595300,7353333925740891270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1728883140412595300,7353333925740891270,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2204 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1728883140412595300,7353333925740891270,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2116,1728883140412595300,7353333925740891270,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6104 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1728883140412595300,7353333925740891270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4932 /prefetch:12⤵PID:4944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1728883140412595300,7353333925740891270,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5048 /prefetch:12⤵PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1728883140412595300,7353333925740891270,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5708 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1728883140412595300,7353333925740891270,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4792 /prefetch:12⤵PID:4164
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1668
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3672
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
5KB
MD5f9601d6d62823e1910004e0a33a56b11
SHA16a5abd3ba7df3bc8d489b3b80fec12bb3a0ef207
SHA25661e64d1564e77341a7d4b6275525b17508e3f7c5b8829c2f86623e34839e8c53
SHA5120ad33a69ecc7f5838d1c6962fc884869424f32aa69cf3ad12fbe4ca0d3e5d6e30d99e7fd5659c3166e944dd824e745cc02fccad4ead46570eeb48cdcb79d74a3
-
Filesize
6KB
MD57cdcc68895b647e72c76db26c2f42e4b
SHA14710218bb5ed45b1c83b8c8da62936bbd4a22d54
SHA25629629517a1d26104fcc1b2c072e77d04642c5f3f909ba6d145b4dec71024f71a
SHA512cdc72835b0278feec4cbea00869915f39c57d460e7b18b8b194be56be384aa62ce2b1ab00320d5e7367c9a96dbda52153b6cf33750ab2561b68a211522e2a53c
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56409fc3bc5bf9030c676339771b37ef2
SHA13baeb87b082832d80f335ccb54f92987da23d1c5
SHA256ea46a382bf270f87efc4ea4f089fb7e50553631723e2ebdc825ad71666a69777
SHA51239976f11cc270184672dc826517b68255a08b492737a43614e55c0d807a0775737d3bfd933546f1f8e0abe47ede77b81783c4fba9f602f261923db56af1ee038