Analysis
-
max time kernel
145s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 08:36
Static task
static1
Behavioral task
behavioral1
Sample
c6d4dc7e357f1ce2125d8720eab957ff_JaffaCakes118.html
Resource
win7-20241010-en
General
-
Target
c6d4dc7e357f1ce2125d8720eab957ff_JaffaCakes118.html
-
Size
63KB
-
MD5
c6d4dc7e357f1ce2125d8720eab957ff
-
SHA1
8c6f11a54c8a25af606a183fb6a3907a6f714f97
-
SHA256
821b04ab40a20d3444bc53e076db326de5e98026831e6d41e86c2851ece17481
-
SHA512
fd53383f476d637db22df01ee1e7a0f6bff2e02fe9cbfcd17eee67cf0a94bb60f8694d34b525d0b4512a30419fa5b0489d5330398513f38ddcf66dddbd3a8a3f
-
SSDEEP
1536:ZazGwhEGtlNJQL1s2SaKb96Z4Hsj4j5C94f1dxtPqK:ZazGwhEGtlNz2SJb96Z4Hsj4Q9GdxtPF
Malware Config
Signatures
-
Mark of the Web detected: This indicates that the page was originally saved or cloned. 1 IoCs
flow ioc 85 https://jira.ops.aol.com/secure/attachment/688199/failwhale.html -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4936 msedge.exe 4936 msedge.exe 2124 msedge.exe 2124 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe 2848 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe 2124 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2124 wrote to memory of 4804 2124 msedge.exe 83 PID 2124 wrote to memory of 4804 2124 msedge.exe 83 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 3940 2124 msedge.exe 84 PID 2124 wrote to memory of 4936 2124 msedge.exe 85 PID 2124 wrote to memory of 4936 2124 msedge.exe 85 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86 PID 2124 wrote to memory of 1972 2124 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\c6d4dc7e357f1ce2125d8720eab957ff_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffcdb4346f8,0x7ffcdb434708,0x7ffcdb4347182⤵PID:4804
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6878843887858920205,11737616053311484861,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,6878843887858920205,11737616053311484861,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,6878843887858920205,11737616053311484861,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2684 /prefetch:82⤵PID:1972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6878843887858920205,11737616053311484861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:1052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2100,6878843887858920205,11737616053311484861,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:4948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,6878843887858920205,11737616053311484861,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1696 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1800
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2120
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
1KB
MD5c94aeee17208e741e58198bd3b8dfa16
SHA1eb8bb23e3c96f357707ac4ec7eedafb2208ee1e7
SHA256e49e1661e43b19aaae0d777b6e5604d831aca4962ce0d1fddf9a23cf7be6bc69
SHA512a46578a7a73622b21eba70708255450a91281f7bfc944e24bd0d484481c778cee3986bbc32ff93d2a6c1588f000d177b904e90d6c589421a31fb20ea710ecbd1
-
Filesize
5KB
MD53449896088f245af90f841d6579ff75e
SHA1fbd79310fc8bbd2cb38dbb25465bade41c7953e2
SHA25675604a9a4e7e4e69e087df6e6e376a818ae6c4a276826eb8366ae66656433699
SHA5121f64b7d79b0e021925988d2d700fcac2c74820ac9f36b5410fb073a63d98673c68ad45249044e0dd51f9892b6aaf4819da82fbdcb19a4d1ebaf6e7ad4e66fe78
-
Filesize
7KB
MD5aae42c8d9440e08fa66995a77c057f21
SHA115f7caef1eaeed039b4873bb45ab20344f847d40
SHA256eebcd1755ddedc1f0448087a83a97abc4563655a039fcf8be780a8e5f4d4812f
SHA512be52fd9c84a487b9369219f58bed06b20c50344db31b010c8692e9d46a40b9c6f5744f5e1f1c5c5b827b8dc19e957368ca05d42644d651672f5ee42a1e11b23a
-
Filesize
10KB
MD5801c03c62b6a6eb5cad9ae136fdbb3c6
SHA10c043606c024fd875ffbdc674c0d514def26074a
SHA2569ae2708880ec8df8533ae1b4252fc13efb021e2eb86f77d412c4a48d2b9afd3c
SHA512bbc22b1585ad0c66f5819e0aaf9a1e46807d62ec78811956ffbbf5073a06c5df1feb44daac109f8dab0a2d5dc0f974543b358f480126d68530707c50af58e0d6