Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:10
Static task
static1
Behavioral task
behavioral1
Sample
b4ed52a4c50f244eb1ab4e546546befe_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4ed52a4c50f244eb1ab4e546546befe_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4ed52a4c50f244eb1ab4e546546befe_JaffaCakes118.html
-
Size
57KB
-
MD5
b4ed52a4c50f244eb1ab4e546546befe
-
SHA1
0198f64fb85a99f823aed5c0a94f399a765fac10
-
SHA256
bb071af1cbd86c30d4617a7e634ec2a7c89773492b2058942dc999877632da7e
-
SHA512
6128481c520fa61433ab1f3fa0b516b3f1ea8f53979fe4b6dda7d81aa7600e535a55f679da2bc181c225e759ad3fa7aeb9a982ff6f2a3fcc2c487f65879ff1a9
-
SSDEEP
1536:ijEQvK8OPHdsA1o2vgyHJv0owbd6zKD6CDK2RVroBQwpDK2RVy:ijnOPHdsR2vgyHJutDK2RVroBQwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 2940 msedge.exe 2940 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe 316 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe 2940 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2940 wrote to memory of 1712 2940 msedge.exe 82 PID 2940 wrote to memory of 1712 2940 msedge.exe 82 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 5116 2940 msedge.exe 83 PID 2940 wrote to memory of 3648 2940 msedge.exe 84 PID 2940 wrote to memory of 3648 2940 msedge.exe 84 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85 PID 2940 wrote to memory of 1192 2940 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4ed52a4c50f244eb1ab4e546546befe_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff240946f8,0x7fff24094708,0x7fff240947182⤵PID:1712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9348527779968314670,6275847107196294568,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:5116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,9348527779968314670,6275847107196294568,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2228 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,9348527779968314670,6275847107196294568,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9348527779968314670,6275847107196294568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9348527779968314670,6275847107196294568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9348527779968314670,6275847107196294568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:1264
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,9348527779968314670,6275847107196294568,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3768 /prefetch:12⤵PID:4608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,9348527779968314670,6275847107196294568,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5284 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2148
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
Filesize328B
MD5d69e4122e0382f11f83b7fc23f4a6c6d
SHA1f9b33fbfbcf768fe331dfca2252d5013bc4c2ed4
SHA256b63c0d001c8562fe853f44068f6725ed8de8bacab2516e29efb9f49da6c644e0
SHA512668e6307702d05848dfd21c93328e6477335f9da8af4e362320336a43f9a90afb4fb0c945031f337b2f11b41099f7ec5d9a896ab92000f9fa67d101607a99635
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
395B
MD55e8718b399494825c2829204c2e97987
SHA115ba5a0e07487a930a0efc53d3ebef97a6423caa
SHA25610a2e8ca7e8d22612317d4e1895897fbfc8637b01ca7e909188788033ec885fe
SHA512e5e99d65eddf3122484e0acd000abfd4bc134d19c8e5ca9c51121be261aeedd9d11eb40142767344e9119accf045f1b5732b62277c59473469a24968deee7e2e
-
Filesize
5KB
MD5b0c6209ab47d89513419a097294ab44f
SHA15b40614951a0e76c6b4eefe75bd926a752f7de5d
SHA256d182897ea60f8cb22cf3bfb2634bc5f03d2908f8a3410e4f9f6cbe906fc4dd45
SHA512474adb56ccc86fd00b85022faafb44ff7b7fb1a894ec98e97effc7e1fc51f25ffcd5be181cf3a43e1d2b2ee79bd2fcdca2ab3431f409470fce32c551973f8eae
-
Filesize
6KB
MD588cc1e2546588a1ae8226bf54bf54c00
SHA1f3864c8d1977c418da007c863968b14c07ad5880
SHA2569ca1cc089054c06412635a8330e61ff41f315fd54e0d5662bfb27e1da111d214
SHA51216dcd96da92bb2c1e3a5fd29faa01d62a288a031533133ae70d38e09af3e54fc219f37c905ad2b10898da292cdb7b3e9c322bf736419fa2177db84e53b0b75e6
-
Filesize
10KB
MD51aa5bc44492c1cdd1bf03a6126f97828
SHA122afac9572fa03b46a77bdf985faaadd87e54bc5
SHA25670f89f53ce2ddbc8f746fac265b8bce89939530348051817a78f4d27c6a182b6
SHA512d85d8f9e1857b2797da58aec813c5bf63fd9b18bea573327ce167087d0dfb0efce8bcbba540d9676e8586ad5d9ddca4ef47d0338166a8bb4886dfc3775ac289b