Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 22:19
Static task
static1
Behavioral task
behavioral1
Sample
a4694029d2117ca5fb2cef94476a0629_JaffaCakes118.html
Resource
win7-20240903-en
General
-
Target
a4694029d2117ca5fb2cef94476a0629_JaffaCakes118.html
-
Size
4KB
-
MD5
a4694029d2117ca5fb2cef94476a0629
-
SHA1
1f4f16d42dbb840ed2ac0f9e8cc2e86e2a217858
-
SHA256
5e8c82c60d115a43a4acbce9f06c50edbe34cf5452cc439c929dd946786c8197
-
SHA512
2c44f75c424129da170f06de52a7565c403c71bf484b8c7a7282c9ba5af47aa37eb0cdd6552489375a718528b7d3ff5c2cdeeebd0241802d490dc03ec1736608
-
SSDEEP
48:t8MELTua+KyvLOJZavtqdJuZaO7D3qQk6kkmkTTi1Nakpn/bC1gZy:/EGIKLO2tqdJuZaoD3qM852T
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid Process 3280 msedge.exe 3280 msedge.exe 4080 msedge.exe 4080 msedge.exe 4872 identity_helper.exe 4872 identity_helper.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe 2200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
Processes:
msedge.exepid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid Process 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe 4080 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
msedge.exedescription pid Process procid_target PID 4080 wrote to memory of 696 4080 msedge.exe 83 PID 4080 wrote to memory of 696 4080 msedge.exe 83 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 2544 4080 msedge.exe 84 PID 4080 wrote to memory of 3280 4080 msedge.exe 85 PID 4080 wrote to memory of 3280 4080 msedge.exe 85 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86 PID 4080 wrote to memory of 5032 4080 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\a4694029d2117ca5fb2cef94476a0629_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcd71646f8,0x7ffcd7164708,0x7ffcd71647182⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16393703795708009524,6522275927608611457,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:2544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,16393703795708009524,6522275927608611457,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,16393703795708009524,6522275927608611457,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2872 /prefetch:82⤵PID:5032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16393703795708009524,6522275927608611457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16393703795708009524,6522275927608611457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16393703795708009524,6522275927608611457,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵PID:388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2128,16393703795708009524,6522275927608611457,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5268 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16393703795708009524,6522275927608611457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2560 /prefetch:12⤵PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16393703795708009524,6522275927608611457,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16393703795708009524,6522275927608611457,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3468 /prefetch:12⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,16393703795708009524,6522275927608611457,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3432 /prefetch:12⤵PID:1556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16393703795708009524,6522275927608611457,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3876 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2200
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4596
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4200
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
189B
MD5efd079652ad21c50d69ad30ccf61a40d
SHA1000bc74057bb6ab42d2a160349e1597edb211bc2
SHA256045646bc1a87f1ce57c87ba8a6ed5332e36f71e667ac712be1df2fef80385f8f
SHA51235f643af8bb12bb445e3e6ce7577376dc69010ddf8d7e76752d703cb50f091bdeb9947b9718baa6e9e286d69df19a794522e446f29d58dc26dfea571045f51ab
-
Filesize
6KB
MD5b4ed412c8784bdfebfbe11d9e5dc3f9f
SHA11d467d36ce31a4d339fa407af0411df93e9d6f00
SHA256fb4c5ae5a88808b77472910833ff7920bdb22cceb54a35871c2d8b0352b5e25a
SHA512ff86a9472d7a899462ab9a5fe65405153d104d3d9298decfe7233482c1c4c60860cdf5704d53df085453052310140970e75c73d7604cfd8229adf7f911ee3161
-
Filesize
5KB
MD56e8f64a90c8e5f26c8b2cdb643c12c8f
SHA1a64c8d9ba9ecb049e77fa567e26077442df851c9
SHA256a21cf52dbd848c7c0a0d79d140302c3793a718d5a9aeac80c54bf3ba608a01d2
SHA51218de9e2fbb2c3c6bfdf2d663fc19fe8d93c6f3f34843b633eaff8882cee325d8de00668f02a4084e5bd976eefc369df10c39244cdc9c12825de3389045bad72e
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5292faf9ea66ba3429a708349e53200ae
SHA16bd8d530e73ae61393520ea6266aaccf83166e50
SHA256fa5e3c60ba6f35541822bae647e4eeecc0d54a720f77a3e0429f6d0c24244578
SHA51209180b50102b73dc3eac05bf4fbbbf14b9c6cb71f88c637d308100aa1a24621d766528b2940633416d5a932b9b9dc34edff76548d4f26d68a20239f90dd32147
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e