Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 04:12
Static task
static1
Behavioral task
behavioral1
Sample
d09a51d9492c55f79a3de710f4bf05f7_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d09a51d9492c55f79a3de710f4bf05f7_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
d09a51d9492c55f79a3de710f4bf05f7_JaffaCakes118.html
-
Size
75KB
-
MD5
d09a51d9492c55f79a3de710f4bf05f7
-
SHA1
55be30792be74367b3df90f7a93f9cdc1b80485f
-
SHA256
f014e24022cfb9aa8c42aa4742969c4b9b88023dedbddd30ca0a33533596948b
-
SHA512
efc5920e324054d589cdba4d57dad3c3d62bd53d31c8622b880223aa8579cba9d37009cfce90d90b7d97332bfd26a3240f6e3394113b6fd594ea50619c9a8e9f
-
SSDEEP
768:EirO/4HDG3xsf7nJP5lWao5aKSYgI4oI6zqTjyWv0Cv0Bin5f4T+hbsyfyzpWCVC:EirO/krfrJPia6a5I4oIVyQ4yhbskyzW
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4020 msedge.exe 4020 msedge.exe 2444 msedge.exe 2444 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe 3548 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe 2444 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2896 2444 msedge.exe 83 PID 2444 wrote to memory of 2896 2444 msedge.exe 83 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 1396 2444 msedge.exe 84 PID 2444 wrote to memory of 4020 2444 msedge.exe 85 PID 2444 wrote to memory of 4020 2444 msedge.exe 85 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86 PID 2444 wrote to memory of 336 2444 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\d09a51d9492c55f79a3de710f4bf05f7_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc69e246f8,0x7ffc69e24708,0x7ffc69e247182⤵PID:2896
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1888308335176294677,12220289350693236158,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:1396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,1888308335176294677,12220289350693236158,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2220 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,1888308335176294677,12220289350693236158,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2696 /prefetch:82⤵PID:336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1888308335176294677,12220289350693236158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:5040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,1888308335176294677,12220289350693236158,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:2644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,1888308335176294677,12220289350693236158,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1900 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3548
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2000
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
797B
MD5519e52cc6788c468ddfb6f122ba02c46
SHA1b8cdfba0e685ca81632aee07963fc089f0362e08
SHA256e76185e1c1418be6bca977f367bf4d8440b41de3fae0adebadceba89ac885993
SHA512959d35778cee57b1cc6b23daa4094718fc150a9d028fd6c523cd0780052afd21bd44031dfcbf447697603d4e7185aeaa62d686de6cc757e8f13bbef67d30a316
-
Filesize
5KB
MD54c1250006566624f26d66805c614770c
SHA118cd193ca73eb0b05174e7c33ea2801332aaa563
SHA256760ad98fc0e4e6f3f2d5f8e654df8db2cb34d149e3a1ed8755f6234da58a6932
SHA512e3c159d759777d572319192200621b3234104fea87b34784e3e892bf27acde915aec71f6bef33149e65faefe3b3becc87b2c59c22cefb372cc03e48f2de916b2
-
Filesize
6KB
MD518df9e73ba2010926dacfa3305cdc7a1
SHA12feb6cb1cd68eb086a2e328efcb1a907e73941c1
SHA256842b7fcdcdf65b920f2cc5712f983503490f9ac83f4c407dc6c95877e6661580
SHA512ba93f36e52a75040e12034cc29f9aba0f0acc173b4e277848dd5c6c3dbf53bf47b7913a999bcf8edcda05486ab7a959bbf5a9b30425cdd923885bab6993cf80b
-
Filesize
10KB
MD517f0a379f81ae4fa325a5c0576b6459d
SHA19b883fda70a3485eafb9daf1ab4a6535e6f6cdc0
SHA256d8140ae8829ad18f7a36789240962447ea38e5e9152e69e17f1765f69fe1c401
SHA512613c2264a51c70b0e7e0a811ad1c9f0bbaa412dfce2a74e5695a80e95972e326b4da80074df581a38b2eb921dd5e2343b27ded97ee15b7818ba34471782ce84d