Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 13:42
Static task
static1
Behavioral task
behavioral1
Sample
ac858fbe29b6ae66c5300b18d86fdad3_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ac858fbe29b6ae66c5300b18d86fdad3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ac858fbe29b6ae66c5300b18d86fdad3_JaffaCakes118.html
-
Size
137KB
-
MD5
ac858fbe29b6ae66c5300b18d86fdad3
-
SHA1
f7026411820810ee0e94ce56c717d2621a2546a6
-
SHA256
199ea14430f0fcff4c87c793cd62a8cebba735baa6d8c9cfcfbc0b4258da4781
-
SHA512
48d44ef488c68b7aa48dfb2a06d1c84f6f551a0b71b504347d152cb6b90913ce2f6146549997f4976a83347a2f4a68810cb8813292af6bcdf3607486f3320e89
-
SSDEEP
3072:ZTgpBXdYvSOCirqiigLKe5usc7odsh/22DKFBtp:ZMpBcSOCirqiigLKSuscU
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4628 msedge.exe 4628 msedge.exe 2204 msedge.exe 2204 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe 4316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe 2204 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 4276 2204 msedge.exe 82 PID 2204 wrote to memory of 4276 2204 msedge.exe 82 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4028 2204 msedge.exe 83 PID 2204 wrote to memory of 4628 2204 msedge.exe 84 PID 2204 wrote to memory of 4628 2204 msedge.exe 84 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85 PID 2204 wrote to memory of 1716 2204 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\ac858fbe29b6ae66c5300b18d86fdad3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff80bd346f8,0x7ff80bd34708,0x7ff80bd347182⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12501951606166965949,2144276867058406414,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:22⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,12501951606166965949,2144276867058406414,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2180 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,12501951606166965949,2144276867058406414,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12501951606166965949,2144276867058406414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:2388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,12501951606166965949,2144276867058406414,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,12501951606166965949,2144276867058406414,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2228 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1484
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:880
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
1KB
MD5572671ecd9ec5d657f3a9db149abfb02
SHA1ac7f276549560fe110248c39ddb31a5d47edd735
SHA256ef520da0c8a3d5c6f6f2479801643af146ed46a227bf039861b52ac78325fb60
SHA512eee0acf0b5d404927e66108d7400839db2585856197e75f2f76042f9ff2b6b5e81ed9d50f491ea7b43c6b4eebedcdce91229c003bc59b67d77c3b1e41853f7e1
-
Filesize
5KB
MD5e6ac71609805f544a81b6c79508ab58e
SHA1321a63591711cef5fa3828f347e0aab403cef13b
SHA256b5360b2a8d4ab6a85c0c84e8048e36d5444121a478c9d8ae742a5e2bdd83aee0
SHA5120f5e8cc0f0f5067d89bc42034667025ac49ca650285cd0f4c9bd9382a4ec54c7a57745b6ab3413cfe04d8fc5f4f14ea55c69342d021967cd533212668f106fd3
-
Filesize
6KB
MD51474013d05831fa1ec61b84ad1ab4695
SHA135c7094087b9fc2d32c13b4d5205d498e710d85e
SHA2569a5e690aa08379deb7f3c1c7d320f13691af0a717e104bb33fe91b44a017e4ba
SHA51271a47580106357c8ac04f2a438e872db16596f6132c7896fdf12dc651f2b87d60ec2791dfa8bb762e347a64214d19db14c8a227dcb6bb55224a681eed95ca952
-
Filesize
10KB
MD512e516596764c983fca1955cb452345a
SHA171892a744311fc948edcaa137ec41c9ebdb56c17
SHA25631eac760a7ea9634aaa30efd06bcfaca3643ffb7b79f25aa2bbbdb11b610a37b
SHA5128e67f574f857868a3859ea14ce864a9d6eb0b25ccc761d782d99b7a82461d5cb46a7f82b561d98b7148cc5d5243a505ec7ab6694e0b1ed1f85e004e401fb8e8b