Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 01:27
Static task
static1
Behavioral task
behavioral1
Sample
9f0b92d815b605ebad1c76acc5adec2a_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9f0b92d815b605ebad1c76acc5adec2a_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
9f0b92d815b605ebad1c76acc5adec2a_JaffaCakes118.html
-
Size
214KB
-
MD5
9f0b92d815b605ebad1c76acc5adec2a
-
SHA1
df966be7e29e4affcbce1e9249e33b6556a72da9
-
SHA256
bf1786cbc035f06cb11616c388c4778b3937771f063779536adef52d8bc4447b
-
SHA512
af31019056255bdc44c415e6c1ad9de394e1b14dd0863d9534c150d609d9db03805b2586e73a38e70c6f8f3bfffd54ac3c44bc38937d7d4c7b48e1b0beee6a53
-
SSDEEP
3072:erhB9CyHxX7Be7iAvtLPbAwuBNKifXTJc:mz9VxLY7iAVLTBQJlc
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4476 msedge.exe 4476 msedge.exe 224 msedge.exe 224 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe 640 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 224 msedge.exe 224 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe 224 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 2940 224 msedge.exe 82 PID 224 wrote to memory of 2940 224 msedge.exe 82 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 652 224 msedge.exe 83 PID 224 wrote to memory of 4476 224 msedge.exe 84 PID 224 wrote to memory of 4476 224 msedge.exe 84 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85 PID 224 wrote to memory of 952 224 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\9f0b92d815b605ebad1c76acc5adec2a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8236046f8,0x7ff823604708,0x7ff8236047182⤵PID:2940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,7284936898600150061,9252358292107128805,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2072 /prefetch:22⤵PID:652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,7284936898600150061,9252358292107128805,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,7284936898600150061,9252358292107128805,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7284936898600150061,9252358292107128805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3308 /prefetch:12⤵PID:4980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,7284936898600150061,9252358292107128805,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,7284936898600150061,9252358292107128805,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3168 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:640
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4916
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
5KB
MD5e9afef2348d77aea8c2ed35af3fe4d2f
SHA1da880d7947ef9c64812e44d87fa7c895dcbc80f2
SHA256386d91ec08e9e8a83b149894e0430fbe932b6d2f79a9be6f2274abc656a38f12
SHA5125d9e84c35c52cb3c35d8fe271fcb716a22495f1ca584f27e46acfc7b21d4677780f3c9b85e0ede6b1eff90c81cb2be73e7b1019cedf2f33e3bf2084a406fc45d
-
Filesize
6KB
MD563e7072fc3ce86f52fd8f08726293498
SHA170bedd97fde1bdcf64d1506954a2a3912d5ef81a
SHA25649e275b5b15a25bebc74e1471141ba89d16ef3f9db5e5f2621810e4a2ba49860
SHA512da3efb60c70369195669bae2c3af8f036fb4f5353f23a04d063428abd7a4fa955e0a1b1b1571ffc0dc555a22c510dbbbfb0bfdf5708fa94739b2b31c25c8f0d3
-
Filesize
6KB
MD5b2d5ae106ed40a2f64299b5f86e2be8d
SHA164b5b2a1f5ae008bac116bb5e4b12f8c10687bb1
SHA25611054216dd88a0ed306e4065d2ce13a140a7700770ce5e08fa6828808e97a8a8
SHA512e9cea3bd030bc5e51324a725d0bfe4c4f52af5ae2bd065b6f24511e6104ce894da7e052d78e941b65a2fb90eac404021f1cd03c2a4a9f4371ceae62005adf27b
-
Filesize
10KB
MD5b20c366beea4c127471637684c8b4e1a
SHA19cae87012383fbadecc975045e47540ec1e750be
SHA2567086edca7aaa59a36cac04713816a899dcf6b339ee08ea7281597c36a3322416
SHA5128f604d24f592ab1d5515aa1f25bdbe3e1adae584800d26a2d8bed27bcf2dd64bcc7c9b5a74b58e6dd30d2a49a38047820ce545107c28090a247737637b5427fb