Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:14
Static task
static1
Behavioral task
behavioral1
Sample
b4f0d82a7b0e3bde7aa6149e77c89d43_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f0d82a7b0e3bde7aa6149e77c89d43_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f0d82a7b0e3bde7aa6149e77c89d43_JaffaCakes118.html
-
Size
20KB
-
MD5
b4f0d82a7b0e3bde7aa6149e77c89d43
-
SHA1
14008ed1e106f0e118b188277dbd364f01d5eb80
-
SHA256
871a845b4754c3f0f03a19f4becd3260da16e61116b4f8c47fc9468570e043ea
-
SHA512
4b1c84da2d86533efbdc2f90ffbda4313dd5f244d4d9816887c6c7237b19d95ad25af168146ef455e49dd11040f4863d456e8ac9c5b1fb8ef5f317b490d6afc6
-
SSDEEP
192:SIM3t0I5fo9cKivXQWxZxdkVSoAId4LzUnjBhN382qDB8:SIMd0I5nvHRsvNMxDB8
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 832 msedge.exe 832 msedge.exe 3000 msedge.exe 3000 msedge.exe 516 msedge.exe 516 msedge.exe 516 msedge.exe 516 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 3000 msedge.exe 3000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe 3000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3000 wrote to memory of 1648 3000 msedge.exe 83 PID 3000 wrote to memory of 1648 3000 msedge.exe 83 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 5016 3000 msedge.exe 84 PID 3000 wrote to memory of 832 3000 msedge.exe 85 PID 3000 wrote to memory of 832 3000 msedge.exe 85 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86 PID 3000 wrote to memory of 2280 3000 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4f0d82a7b0e3bde7aa6149e77c89d43_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd7c1246f8,0x7ffd7c124708,0x7ffd7c1247182⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3895116302112957012,15235737190727024267,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:5016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,3895116302112957012,15235737190727024267,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2280 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,3895116302112957012,15235737190727024267,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3895116302112957012,15235737190727024267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:4500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2124,3895116302112957012,15235737190727024267,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:1984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,3895116302112957012,15235737190727024267,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5000 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:516
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3080
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
5KB
MD5d7b854029c656d93ed09c9bad8f6f44f
SHA1b271643aa669092367baff1401f3489734e67187
SHA2568e54563e6da472c3780718e336f0c51b9b6547b04fa3e6ce3c77de857c5ce651
SHA5121e31c43183fc18c2168e319c685ce3fa243497d868568b678454fc41b0a13f943eb63682a1a22d1f7eb162093b9f83a7ad7f573dc14993788554f66baf753e15
-
Filesize
6KB
MD57ee17faa2ba94244a261496ca365c2dd
SHA1a19341211ebba2963e2986733631525d13bdb18f
SHA256a76c9e1f62f69f84b52083b6fa994273ffbecdd75d24076ab2d0cfff22ad3be9
SHA51249223e327995100df5c35d32412663cf3c5e5aee74c24a06277fccb8e6463baf85bb12512a23c32036c6d08e83c04cd7f191eaa29fc484d71544bd6d192693bd
-
Filesize
6KB
MD578101cba1e028450d27b16646b7af132
SHA1ca774955b0b6b80c8f536d22eb1b0a07dfdaaf17
SHA256d7ed21a6f74c335567e53e84654d64bc615bb31a0d1a01f569e3cc6a4f8da49d
SHA5123e087e7c2a2b74412b70e0a7bee98a16fc6fa71ceb3986221d93ec21d4b1f9e40e3c69634c3d4d31fbbd25a109e9a2c62418c77c28860f29c38c3f309fec15e5
-
Filesize
10KB
MD586aa48e4ca1be89b3b638f8753f4b919
SHA1aad73eb6db20d08b0630ab443b76ad9017908dd9
SHA256e5d46543c124c5b882bcbd881a30ce14d1469dc019d83ebb3508b4a577338703
SHA5128bf43ef2f800c1454c253c3ef8b37f6a5ff0fd8bffbc000bff7bd6332c6987a2aad17d62eafba5c7ad86acb914a12c0c47998a72373ee6c2b59ab031c8609afd