Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
b4ed8b2779696e3730296c47ed40dd02_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4ed8b2779696e3730296c47ed40dd02_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4ed8b2779696e3730296c47ed40dd02_JaffaCakes118.html
-
Size
57KB
-
MD5
b4ed8b2779696e3730296c47ed40dd02
-
SHA1
b9238fb55a43b1ece445b73f7acd9565a441d8c6
-
SHA256
bb6c6329bfe8ae6beeeaf6d9c21e8f89547067718f6f1775c9bb4cf39aef1fa4
-
SHA512
9ee0287e13b6f509ab55bd5ce3de04c0fe1d485e63292b855e41c7e24f0e48a1fc5301c969ce7610e75e9aa86c19aca81883f426128b6180611a939ed7079dc6
-
SSDEEP
1536:ijEQvK8OPHdFAeo2vgyHJv0owbd6zKD6CDK2RVroFpwpDK2RVy:ijnOPHdFa2vgyHJutDK2RVroFpwpDK2m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4904 msedge.exe 4904 msedge.exe 3792 msedge.exe 3792 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe 3460 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe 3792 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3792 wrote to memory of 5052 3792 msedge.exe 82 PID 3792 wrote to memory of 5052 3792 msedge.exe 82 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4520 3792 msedge.exe 83 PID 3792 wrote to memory of 4904 3792 msedge.exe 84 PID 3792 wrote to memory of 4904 3792 msedge.exe 84 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85 PID 3792 wrote to memory of 3608 3792 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4ed8b2779696e3730296c47ed40dd02_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd56ce46f8,0x7ffd56ce4708,0x7ffd56ce47182⤵PID:5052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9618063390381556838,17126374226737601788,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:22⤵PID:4520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2152,9618063390381556838,17126374226737601788,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2356 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2152,9618063390381556838,17126374226737601788,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2788 /prefetch:82⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9618063390381556838,17126374226737601788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9618063390381556838,17126374226737601788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:1784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9618063390381556838,17126374226737601788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2152,9618063390381556838,17126374226737601788,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3744 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2152,9618063390381556838,17126374226737601788,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5064 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3460
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4332
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4300
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
395B
MD5e15128b65174e0e6d807d0e433bfe1a2
SHA14b1d49377295c72fabf703a4d01b6519d2ca7101
SHA2565258dbf3095812ecbb98db55ed9be9f0dd6ab5da132f87610dfd89a3d7ee0db3
SHA5127b9f78f1070301b76e5f4b180b70672d1d1a5dff29519a9af1fae2e729ac423998528cf4bf2bbb836ee4c4eafe52cfe81fb0060e64042eef9e231a4c162fb936
-
Filesize
5KB
MD5a3832458bd45cefa0bf3529ac7623b13
SHA1e6753c86b9c6b2ef1fb4554baca69a629ddd05fe
SHA2568baca6cd8549af9b695c408d379fba889fa531ff22800b8023b70c62c9aa9a2f
SHA512e6ed87d0b538d637f2245a5a40bdd740eb10b415f0ff7a9d178b26596b4b1177c85b15e34d6cc41f48255846cca72c9b7ef261bc0cd2a0187809c88faffdb824
-
Filesize
6KB
MD553080b54b5e1853ebdd2a2377e2eb8c8
SHA1ec24dcf62f3ef45877102cd8a2db27ad6f12aa67
SHA256034fa5c4b5aa584ed4a8cebb7d06982bdc556968fd6c99fe261baa2fedd7c623
SHA512a1d3f80cf9e95120b3ba7a97bea401ad4a34f465e2927543b244a979f68c39896a646dc63f2f09285d5c8b048cf786c517f5b6008e1bd7ccf82b4f6f337bcaeb
-
Filesize
10KB
MD56d9301d6f861fe38b70d52a80e4196d9
SHA1947cba5d6c98236944ca54f84766b8fbde8fefbd
SHA256d060ca147b2d90d2a3ed0b8267dbd096d876119e66e2091d26371231a31a791f
SHA5126d5a1a31f01e5772e399c831a66dfd8a11dbb8341071bd1ddc3f77ec9a7b4f6746710b659e8c62f32c2fd03d8234689bc37e2918ec091f4908802c749bb58a9e