Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 14:10
Behavioral task
behavioral1
Sample
b1c1165992967935962d002c4f9388fc_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b1c1165992967935962d002c4f9388fc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b1c1165992967935962d002c4f9388fc_JaffaCakes118.html
-
Size
127KB
-
MD5
b1c1165992967935962d002c4f9388fc
-
SHA1
89582e93b30ecdf44e2038472d71b4816dcf8bfe
-
SHA256
03da7b9b096fd381bf559c7fd0fc1fd655ee119521b97bf0992b118a8a027cad
-
SHA512
8b357a568f58084c24d4d3d3824ace7b6366e36a4a5ed3fbf2a6c36f3585c2088980fd578cfa32a54b3bdb5fb7db6c908db9446cbc1aa23670a22974b402af37
-
SSDEEP
768:2qk1ATx+Bw24Tp7VDiMidNCiZW0HI8Jj2ECFcsm0IXWhCFAmmv1p4ODMtFA6cVxF:2KHDiMiZdIdECZpZDMtFbcDOXtnn10d
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1080 msedge.exe 1080 msedge.exe 1656 msedge.exe 1656 msedge.exe 4192 identity_helper.exe 4192 identity_helper.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe 3192 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe 1656 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1656 wrote to memory of 1272 1656 msedge.exe 81 PID 1656 wrote to memory of 1272 1656 msedge.exe 81 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 2236 1656 msedge.exe 82 PID 1656 wrote to memory of 1080 1656 msedge.exe 83 PID 1656 wrote to memory of 1080 1656 msedge.exe 83 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84 PID 1656 wrote to memory of 2264 1656 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b1c1165992967935962d002c4f9388fc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff86db546f8,0x7ff86db54708,0x7ff86db547182⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2068 /prefetch:22⤵PID:2236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2140 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1080
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2596 /prefetch:82⤵PID:2264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:3280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6140 /prefetch:12⤵PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5684 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5872 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5920 /prefetch:12⤵PID:1860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4736 /prefetch:12⤵PID:740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5116 /prefetch:12⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2052,14069035177834695822,1643587544739901582,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4840 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3852
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\3a044af2-00ad-413b-a185-52960891dcde.tmp
Filesize5KB
MD585638820eff39daf516479f143b28cb7
SHA11d822ee5b2134fb14cd454e4e313843797cd75c3
SHA256bb1e3a1f3dec2f3c93b819e1a1178d071e36bdb8e7cd968406e94f05546541a2
SHA51270c56b6c95120045e91323037de2e15a45a81782910c7d43616484af80d4808555aa32f9c7b1259b9c3c59a1dc9e980876de3a3be5c581c3e438dda36f0883e3
-
Filesize
395B
MD5920b5080491d6d229f9e4d674b38346a
SHA1d967955f3eb2dda6da61dd5b3199fe3f9e83c87e
SHA256798f9c714d4582c1e9a49831ca67058318853f4c511d643911df98856bc099e7
SHA512c8ac4c22edb2af33207a1bb3f5efdc8e76872ea85c18eba4690fd60b49a2698bc244614a4d72c3021e2f6624da34a903596893662fa714b50ef774996078d0bb
-
Filesize
6KB
MD5a9198e374e0a68c642ceecad951e93d4
SHA1ea683e524f46be30725aa2509ef8e0285d96c511
SHA256afa32b91816b21fc74f8215f8c2861d99d85ec20782d4bf5028bb5c1b4109e66
SHA51220f5d847dce1cb5f65576065c67e8f3871c6591933dfc68be592f24578c7bae23aac62d896f6ec97ea0ca4cb14a455722c8ef4edc4627c46ef8121105f7082ac
-
Filesize
6KB
MD57d592bee033cebe793611d02d60f7bbe
SHA163ba62edd1e8a0a899922a73edbe7640d2199c08
SHA25623814d1245fcd4717b587b173ecba6744433302f3128cd770f7cd063f03fec6c
SHA51229877856c69dc7d780913ec82225850be415706ea9711692c0324e0539fc713bc310e9e16ed2b16743aec1cb1ef0adf8b9bf589e38ad254bc1b7b15617d18aee
-
Filesize
6KB
MD592dbc029fd0f644c4108edb7530b74ff
SHA1e37c59f7605eba5699fd1953ab8dd49780f76409
SHA25693e686ac56998221558ff1e999ee7af3ce887812fb4c9643f7e438aa83b3cef1
SHA512e9c94b3db9b696791c15fc4ecceb5a214d01c7ca7938a9ae2616a36cce2dda0d482c469344915ac5458a2d7046e71d213f151e04229a205f23f6b06fd1534464
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD51b8b9f43e3bb5a5e275f2607f26ecc2f
SHA188d71d2e7b8391a878e26aec407cf9a01ae7aeb4
SHA25652c36d8190f60d7f5bb6ea74de04953239c83ed202d3f57ff018b20ebcbd2fdd
SHA5120aae295aa799b675e7dfa927979c9662fb05c97e9c96ff3528899fce317b8056907e1ee0a85decb253ca941b85a8e4b6dcb22654ecbcccb9318213ff616010bc