Analysis
-
max time kernel
145s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 05:16
Static task
static1
Behavioral task
behavioral1
Sample
b4f2266b906d8e4f947f348c30613427_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4f2266b906d8e4f947f348c30613427_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
b4f2266b906d8e4f947f348c30613427_JaffaCakes118.html
-
Size
56KB
-
MD5
b4f2266b906d8e4f947f348c30613427
-
SHA1
67cd2b1ec41e115afbfa106ff39d394491751229
-
SHA256
dc9dcc46b885d797b935b60baf8dd77ce54c150081cf8b47685913809c70c431
-
SHA512
a88e1e6ef36844134d51fa9b57e4cf453f8b25736879f6ad082b87312104b7339b8d148381a51b75f98e15454029a78e368c02bb6846e1911f415f3f5f956a87
-
SSDEEP
768:jD0y7KstWtCFdP+kEtE/lQ3T/NnPzejgY/rCEe:jD0y7KstWtAdP1EtE/wT/N2gY/rCEe
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3848 msedge.exe 3848 msedge.exe 2000 msedge.exe 2000 msedge.exe 732 identity_helper.exe 732 identity_helper.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe 2328 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe 2000 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2000 wrote to memory of 4948 2000 msedge.exe 83 PID 2000 wrote to memory of 4948 2000 msedge.exe 83 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 2724 2000 msedge.exe 84 PID 2000 wrote to memory of 3848 2000 msedge.exe 85 PID 2000 wrote to memory of 3848 2000 msedge.exe 85 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86 PID 2000 wrote to memory of 2396 2000 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\b4f2266b906d8e4f947f348c30613427_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd5e5b46f8,0x7ffd5e5b4708,0x7ffd5e5b47182⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:1884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4752 /prefetch:12⤵PID:3876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5404 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5400 /prefetch:12⤵PID:2976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5476 /prefetch:12⤵PID:368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:12⤵PID:3980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5996 /prefetch:12⤵PID:1948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2060,414591423728124031,10597688466626850037,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5760 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2328
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4828
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2260
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50a9dc42e4013fc47438e96d24beb8eff
SHA1806ab26d7eae031a58484188a7eb1adab06457fc
SHA25658d66151799526b3fa372552cd99b385415d9e9a119302b99aadc34dd51dd151
SHA512868d6b421ae2501a519595d0c34ddef25b2a98b082c5203da8349035f1f6764ddf183197f1054e7e86a752c71eccbc0649e515b63c55bc18cf5f0592397e258f
-
Filesize
152B
MD561cef8e38cd95bf003f5fdd1dc37dae1
SHA111f2f79ecb349344c143eea9a0fed41891a3467f
SHA256ae671613623b4477fbd5daf1fd2d148ae2a09ddcc3804b2b6d4ffcb60b317e3e
SHA5126fb9b333fe0e8fde19fdd0bd01a1990a4e60a87c0a02bc8297da1206e42f8690d06b030308e58c862e9e77714a585eed7cc1627590d99a10aeb77fc0dd3d864d
-
Filesize
331B
MD5a2d70f9134a149b059b35948bf72c9eb
SHA11edb5f9332c171eb2df895759960f96f8cfdbabf
SHA256eb9cbf632c3412b97c847ea6bd2277274da7e5585bd7bbd9d6b5e9b7154298c4
SHA5128620e112c654b65d252503cdd5884225df5060bcb7f8c3aaec5da200bd12dad2a93fa753c1ea32453cd3cee9e065ec9d0cd946c3c1e6c7dbbbfc5521da697d58
-
Filesize
6KB
MD52400a69f500a897ea45ed15f75c06cad
SHA18422e7230c0b3791d05af4ebcbb1ab92cb7d085a
SHA2565cae04d5e4b50b1d2be6223085157f5eaf43b6c83aebcb92e0b2bdbfe4638e13
SHA51276ee230619fa295ca8e7763e48b489c3fb5186bdef013305c08204fdd0b72a226913a1acd13ee656bc5139fc2de3b2afa85402b96bd834430d068c52ef0a72e0
-
Filesize
5KB
MD59562cdd82356c9f4612cd227d83edeb5
SHA1e2456852d500e2d43b73f944655ad20b321a185c
SHA2562eb5c481dcad6c404e045dbaaee0d9ff408d5614aef49aa30f590c46e3a6ee56
SHA51241f125c3bfd3174f3b03b404f6047180b6a3bede25eb5fb0d7b35fb33bc35da4eb34b2b66846b406225850022f8e0faf71b98c9f6b7ae87189a49c3a2f138751
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5a681890c928bbfa3c138f60f9ea041f1
SHA119e210128e72f95865967b632f88ba1e610022e8
SHA256b07f0673e26bca73526db53e9f209326b52d4fbcc3e8b3c0d93812b6898e1c33
SHA512b73eb08164fd2b6438f39898571bdb937f356ecebc0cc9f8f820fc35a4a48346d2d301473d64f6a6df681527113f4bdb897ee60d6a793c1a140177e0c741fbe7