Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
b4f166ffc47eadec8e89092be4bc9a8b_JaffaCakes118.html
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b4f166ffc47eadec8e89092be4bc9a8b_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f166ffc47eadec8e89092be4bc9a8b_JaffaCakes118.html
-
Size
32KB
-
MD5
b4f166ffc47eadec8e89092be4bc9a8b
-
SHA1
9b89cc7c7f78e3179053e86d88daeb78f4995d5a
-
SHA256
ab09d6bf004463e67e81325f13eb3d34a8990a9b2b95bb7c3936b4f3bd066279
-
SHA512
3b7523070fd8f8fd5b39b544f5c0b785fecc9bfa58dce6bc7bb3cfa845424462a3cd57104641204c6e80292930156c2fc5d72a2112283b79011fe7284ffdb988
-
SSDEEP
768:g7/rt02xYDcoe6pcxH53h69HOcgsJTL5J8:gTrt074thwOcgsJTLn8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3428 msedge.exe 3428 msedge.exe 2240 msedge.exe 2240 msedge.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe 1708 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe 2240 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 4632 2240 msedge.exe 82 PID 2240 wrote to memory of 4632 2240 msedge.exe 82 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 4884 2240 msedge.exe 83 PID 2240 wrote to memory of 3428 2240 msedge.exe 84 PID 2240 wrote to memory of 3428 2240 msedge.exe 84 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85 PID 2240 wrote to memory of 3988 2240 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4f166ffc47eadec8e89092be4bc9a8b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4fe646f8,0x7ffd4fe64708,0x7ffd4fe647182⤵PID:4632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8456735492513070557,17835550256489065262,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2164 /prefetch:22⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,8456735492513070557,17835550256489065262,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,8456735492513070557,17835550256489065262,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2708 /prefetch:82⤵PID:3988
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8456735492513070557,17835550256489065262,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:3624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,8456735492513070557,17835550256489065262,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3284 /prefetch:12⤵PID:3600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,8456735492513070557,17835550256489065262,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4868 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1128
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5b8880802fc2bb880a7a869faa01315b0
SHA151d1a3fa2c272f094515675d82150bfce08ee8d3
SHA256467b8cd4aacac66557712f9843023dcedefcc26efc746f3e44157bc8dac73812
SHA512e1c6dba2579357ba70de58968b167d2c529534d24bff70568144270c48ac18a48ee2af2d58d78ae741e5a36958fa78a57955bd2456f1df00b781fc1002e123d2
-
Filesize
152B
MD5ba6ef346187b40694d493da98d5da979
SHA1643c15bec043f8673943885199bb06cd1652ee37
SHA256d86eec91f295dfda8ed1c5fa99de426f2fe359282c7ebf67e3a40be739475d73
SHA5122e6cc97330be8868d4b9c53be7e12c558f6eb1ac2c4080a611ba6c43561d0c5bb4791b8a11a8c2371599f0ba73ed1d9a7a2ea6dee2ae6a080f1912e0cb1f656c
-
Filesize
472B
MD50d7c65454f6ebb010f3e91eacb35180e
SHA1484bcd09dcc5a4c9c1993a8382f748e194af756c
SHA256ab3e1a6446fe60be44917c4a0eb1fe03cdbda44faa47fc6e3c163ad44ed38d46
SHA51223eff11b916333a23912e1451f70a525526dfcc8975d762b0174ddfee88d5b67f5e6f67ae88c22e06eee9502ef4f9942cfecbfc66ac22d981e34ac7977ca23ef
-
Filesize
5KB
MD5c1051a8b92b823d69ff98ffe1c8af085
SHA17ca54f906b49146f8d3e2259569f72d99f7f1ccf
SHA2568130e5b004953ac69568aa109564777bbfe0f38522cbb3d13861ea5200f48a73
SHA512fec140fcea102de65c619273fade14807097dfa362c6af29e243b264e5c4f851cf549ded109e196802d9d6b3378199f622275e458170aa899311a1d82688cbc0
-
Filesize
6KB
MD52a863176b902fd449a277179db10a9c4
SHA160974bb879f55c151349cd77ca4af6170d15c59c
SHA25603c6ee439371e83c47d690fd56a2503a3423eeb3079766b36e40c1b89b09fee1
SHA512cb54a9daa5b73ceb2b601acbc3506d8b57e7d2a4163fc1b145b6dbd64cfdcf34524981bcd932927e88c00d38a9c05c13b11fc7483a939e41829b85ac9913bac9
-
Filesize
10KB
MD5421a2260bb85c8abac134bea03d20039
SHA133046b2eea79179d177c6cbe835abe82e762d666
SHA256d9f3ec4069ccd6a891377fc80b3d4582beaf7218e3970c56a650bcc0a6181730
SHA51278c1844c605b597220dda174230ab867532b4dccf912a9999ed22ffae31f780ed227329eb22f66ff2e59c8a8568c92fdd040d02b2dbe5329ed98c883d8aef2d1