Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:13
Static task
static1
Behavioral task
behavioral1
Sample
b4ef87e364ebd1b3e74a11beebcc55dc_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b4ef87e364ebd1b3e74a11beebcc55dc_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4ef87e364ebd1b3e74a11beebcc55dc_JaffaCakes118.html
-
Size
139KB
-
MD5
b4ef87e364ebd1b3e74a11beebcc55dc
-
SHA1
a8480f287bc75f3532a938653357988a2d566670
-
SHA256
ea623b97df369bcf4e34fb367e61086dd6828768169602237ad03d00aa6bc6c6
-
SHA512
8cafefdf5455eceded37e4b6ea6b5271c8739b7dbafeb0c42f0670e79be6fdad811181ef8c95e9f80cfd75e2f11767d3f05678fa684215ef745ee3d05b749e1d
-
SSDEEP
1536:SxRMi7KllJ5ryLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusG:SxIyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1716 msedge.exe 1716 msedge.exe 868 msedge.exe 868 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe 4632 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 868 msedge.exe 868 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe 868 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 868 wrote to memory of 2224 868 msedge.exe 82 PID 868 wrote to memory of 2224 868 msedge.exe 82 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 3868 868 msedge.exe 83 PID 868 wrote to memory of 1716 868 msedge.exe 84 PID 868 wrote to memory of 1716 868 msedge.exe 84 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85 PID 868 wrote to memory of 1124 868 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4ef87e364ebd1b3e74a11beebcc55dc_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1ad246f8,0x7ffd1ad24708,0x7ffd1ad247182⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15764710798303054637,17951197089124478544,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2184 /prefetch:22⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2176,15764710798303054637,17951197089124478544,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2176,15764710798303054637,17951197089124478544,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2864 /prefetch:82⤵PID:1124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15764710798303054637,17951197089124478544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:12⤵PID:3656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2176,15764710798303054637,17951197089124478544,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2176,15764710798303054637,17951197089124478544,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4848 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3536
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4152
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD556a4f78e21616a6e19da57228569489b
SHA121bfabbfc294d5f2aa1da825c5590d760483bc76
SHA256d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb
SHA512c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b
-
Filesize
152B
MD5e443ee4336fcf13c698b8ab5f3c173d0
SHA19bf70b16f03820cbe3158e1f1396b07b8ac9d75a
SHA25679e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b
SHA512cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd
-
Filesize
6KB
MD5b987a8ffd73f2df17456674812436aa6
SHA15ded8b89d618c00a8acd8edd404e5788bdfe570e
SHA25627274d2f5619a6cf599cd2ece861a312f0340a4d88e338e46c213b05212aeedd
SHA51258716c478b86c7a51ff8ae07cb96d9dbd83f35c47439717277066d7194834360e91cb762bb41e75832c139e8d5aa3b3f2934913ee46be336235694f9297b3c53
-
Filesize
5KB
MD5f3ae11a3a509343f5ce45ccdeb31c1e2
SHA1e7e7cf9db4bfd9aee888c06cab7b00dd21719808
SHA2568d2d6a2f5d37f0e23706c04cbc9b702865cd99fc54d0606895c7352c65f61f69
SHA51202779b07f80ad6bafb0e138e8ed6e8470bc827d4cdb89e96b5d33153643d44fca290345c300b5b2832b0424820461934dcfc87bc916152b937e36e42bdfe17df
-
Filesize
10KB
MD51c7178a20a640e1a7721c6094cca662a
SHA1abed35ae9f4ba71372cc1897335669fc538df600
SHA256a4be645aac879c9ef95fff4e4b9c6b4add1026f349d02bc3cb3cb5e4a13f327b
SHA512aef091c6a4600b543ea541685ef4c0b81cf61fd5d705e4a26c517e8908bdc295ddcf32c8113502b8a73caad7af1419ed2ca35eff8b19cd47ea2267cc974275e8