Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30/11/2024, 05:08
Static task
static1
Behavioral task
behavioral1
Sample
b4ebf20c9cbb0c69eedb48be99bbceb3_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4ebf20c9cbb0c69eedb48be99bbceb3_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4ebf20c9cbb0c69eedb48be99bbceb3_JaffaCakes118.html
-
Size
139KB
-
MD5
b4ebf20c9cbb0c69eedb48be99bbceb3
-
SHA1
f26675e4c1e567e16415a5ddb2c4cc9a60397649
-
SHA256
b2ec64bc14e34b8ef72b4cbe03b66c93339c9955e1df54d5de8c154784ac6afb
-
SHA512
75fbe520fc84168120a3e404d01af072f1dbc1f4636dfdaceb2c3ac47b2d42cc778f0cc65cd049d8a17a3d8dee3828ca61f4470993e02dd72812e270e6f081e2
-
SSDEEP
1536:S1RXvUk05ql+yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:S11Uk059yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2580 msedge.exe 2580 msedge.exe 3720 msedge.exe 3720 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe 4408 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3720 msedge.exe 3720 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe 3720 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3720 wrote to memory of 4160 3720 msedge.exe 83 PID 3720 wrote to memory of 4160 3720 msedge.exe 83 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 4588 3720 msedge.exe 84 PID 3720 wrote to memory of 2580 3720 msedge.exe 85 PID 3720 wrote to memory of 2580 3720 msedge.exe 85 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86 PID 3720 wrote to memory of 2160 3720 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4ebf20c9cbb0c69eedb48be99bbceb3_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcbe0046f8,0x7ffcbe004708,0x7ffcbe0047182⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9980160724276187823,4306133755283837492,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:4588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,9980160724276187823,4306133755283837492,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,9980160724276187823,4306133755283837492,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2920 /prefetch:82⤵PID:2160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9980160724276187823,4306133755283837492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2064,9980160724276187823,4306133755283837492,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:2960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,9980160724276187823,4306133755283837492,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4748 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2504
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:772
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
6KB
MD5148a1cb825c4ac6d8949cefbf665d748
SHA16e279e717bfebe78bbf7c65fd63fc5ce48538eca
SHA25630cee33da3f4c69bebccdc490d5a37ce0fc0cdf7ede75e9da5626eb312136b5d
SHA51275e8a4f0f4fab5dfbb7342dd15cc256bc01151d1b81e1c47882efb9040cfb3b27b744385247e64c76b672512962235b492e9bc8b81718af018482fbe8f0c7944
-
Filesize
5KB
MD5022e63e8e4f6efda4c9513177b1391a2
SHA10b144138c5cb45fd6b549678c02ef9ef890329e3
SHA256b8228299d83ddcdb7454472e8a6cadc94241f410c82e9089139cb3972f8795c7
SHA512e3b3ea41329b7a4e8672c8d91ddb3894a6f0287b923e8b9f53aa901c6d51c5bcc1826c3432a027e2be4a24bd9ae5925ab8e1c620d29fbbb4afa6bebccd763cce
-
Filesize
10KB
MD580889596c065222aa9b384f2fd9d2b8d
SHA1578c032797be38dd787eafefddc79400f18c2500
SHA256a5da6924922420d5dedd6ca2d9d6068259154313ebdd8f50e571c904131b96a8
SHA5126d07ff60e93f4f1915123a98b5cac04f1e27c9ace43033e11a5a47973968cde4158095fab4373ef3e382b215a7b117e3de28e4976de25fd2925154a45b134287