Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:11
Static task
static1
Behavioral task
behavioral1
Sample
b4ee0e52394e6cd88c867fa5564997c2_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4ee0e52394e6cd88c867fa5564997c2_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4ee0e52394e6cd88c867fa5564997c2_JaffaCakes118.html
-
Size
53KB
-
MD5
b4ee0e52394e6cd88c867fa5564997c2
-
SHA1
cd25b600bde224a7f065d980d11223f489e88b44
-
SHA256
b0999787e5cd3cc1323e1ec0aeed296fb36cf0464c65c04b1246d1cf70a1328b
-
SHA512
b4f072dc3852a7bde5a52f1887f90ee6f81f35118b5180cd5c8cc882981e7b3296a4fb8e0686c2879354cd7dd96f1fc964806a59a5be6224a7d821df1a045c3b
-
SSDEEP
1536:CkgUiIakTqGivi+PyUarunlYJ63Nj+q5VyvR0w2AzTICbb3o6/t9M/dNwIUTDmDv:CkgUiIakTqGivi+PyUarunlYJ63Nj+qv
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4532 msedge.exe 4532 msedge.exe 3040 msedge.exe 3040 msedge.exe 1900 identity_helper.exe 1900 identity_helper.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe 3068 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe 3040 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3040 wrote to memory of 3572 3040 msedge.exe 83 PID 3040 wrote to memory of 3572 3040 msedge.exe 83 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 1244 3040 msedge.exe 84 PID 3040 wrote to memory of 4532 3040 msedge.exe 85 PID 3040 wrote to memory of 4532 3040 msedge.exe 85 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86 PID 3040 wrote to memory of 1924 3040 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4ee0e52394e6cd88c867fa5564997c2_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x40,0x108,0x7fff0ac646f8,0x7fff0ac64708,0x7fff0ac647182⤵PID:3572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:1244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2992 /prefetch:82⤵PID:1924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4708 /prefetch:12⤵PID:4912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5152 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:12⤵PID:4136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5280 /prefetch:12⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5876 /prefetch:12⤵PID:4472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5828 /prefetch:12⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2168,14205144657170246743,5379733531197804012,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4932 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4472
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
6KB
MD5f34da61a4a37fc2a6687953d3c150df2
SHA1074ada160bd60035f54241977a07137881ff8d8a
SHA25699c67fb305669d67ec19c3616a152e921b58922873c86fd203e0a6c22f0d9d1a
SHA512b7cf46d20a48301dac5bb8603f8571453f0933c890d9791cc866324f87deb9add84e685c8703265a613edeef7a36659f217b064c0bb870b78e2f304b9e0dc464
-
Filesize
5KB
MD5e83933cb8a7116bffa18a1f257c03f3d
SHA15cf92f7a383e6b32eff1cb065093ee404f9313df
SHA256f5d9e0eab2b8df540f1a94bcea6c0d223945f3a76140eae240c5d284b2de0ada
SHA51297f86213bb28d28db7d36c2d1fa096bbf48df1024d3d072b33fbd39a52af2484b3cb43b41ab89e3c6dd74628c878b82ab7d17a0b14aa840122baf3052a53b003
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5769eee9f059579cd3eda36a8924869ad
SHA1e049d9eaf58f324a6e0c4f7fd86d720b4410c6c7
SHA256931deba2bd0154c4840fd3dcc2b5d73595c6d4dcd1735f3586ce74faa832617c
SHA5122f3de82ed8ac19153589173d7d1a38672a8e073cf64047b99caf2f751457875e3109d25281dd45b4e74eaa9d8ec84681a5479a09f487d34de53a3e7eaee2526d