Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 16:37
Static task
static1
Behavioral task
behavioral1
Sample
ec69a16bdd2fd626bd60efc8741e0896_JaffaCakes118.html
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
ec69a16bdd2fd626bd60efc8741e0896_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ec69a16bdd2fd626bd60efc8741e0896_JaffaCakes118.html
-
Size
2.3MB
-
MD5
ec69a16bdd2fd626bd60efc8741e0896
-
SHA1
b08e3bcc7dc06983e680b29368a51d7eb0cdd314
-
SHA256
490ed9df3086c05d70ab333e6f7c6e27b1cfc93cd4138d4137b62275bb3293f9
-
SHA512
a8e12d8eb335f57d8b1342a5a6e5850acfecab8dabda0b3104ae40393d283c519830d90755029300d8206f576890339b1ae69679694dfc0485787c04ee0712ab
-
SSDEEP
24576:P+Wt9BJ+Wt9Bq+Wt9BU+Wt9B8+Wt9Bt+Wt9B1+Wt9B5+Wt9Bi+Wt9BX+Wt9Bz+Wy:g
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2304 msedge.exe 2304 msedge.exe 5060 msedge.exe 5060 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe 4880 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe 5060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5060 wrote to memory of 3524 5060 msedge.exe 83 PID 5060 wrote to memory of 3524 5060 msedge.exe 83 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 5092 5060 msedge.exe 84 PID 5060 wrote to memory of 2304 5060 msedge.exe 85 PID 5060 wrote to memory of 2304 5060 msedge.exe 85 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86 PID 5060 wrote to memory of 1296 5060 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\ec69a16bdd2fd626bd60efc8741e0896_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fff997246f8,0x7fff99724708,0x7fff997247182⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,3467114520869922490,7727295334275683706,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2152 /prefetch:22⤵PID:5092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2144,3467114520869922490,7727295334275683706,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2208 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2144,3467114520869922490,7727295334275683706,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:82⤵PID:1296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3467114520869922490,7727295334275683706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3467114520869922490,7727295334275683706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:12⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2144,3467114520869922490,7727295334275683706,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4216 /prefetch:12⤵PID:576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2144,3467114520869922490,7727295334275683706,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3992 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4880
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4972
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3736
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
318B
MD5dc1e97d4171805be32cefb7cd2e253b4
SHA1a7b1288b194206f4e49f989b46efd65469b19bea
SHA256c852b2d79fb9a56dc855888bfd21c65733ba3461cfb5e702878143b8de80e207
SHA512ccbadfa639f3ff07e2c6cdea24df53e409c7cc8140cc0a36d169591904ab69db038f48b56dfa821ca995feb617350a481aa973b297b81a22c4de46a0a6394684
-
Filesize
6KB
MD59a1b8485bf8de4fc3f1beb126b470c1e
SHA11a53fbd544986851cfc586d0a77fa0bb44932a6a
SHA256be175e2087bd85d72061076d59ef5959d9cad7254fd152c29344c290f64a20f3
SHA512665cc45f34a9e76a0bb226435361a6fd6cfb7617cbe183834625f650ed3074d0196d8be38105db2520f8628664589a96201e4f6ae21271024a8900767d87a122
-
Filesize
5KB
MD5b5ecd3f445a7f4149fb2f57832460d89
SHA1d40b8d076eb6dbdc0237ed19babf8487a522e6c5
SHA2562adb553a7557851cdc22f459fc57ce6d0a2cefbf2d9744d061886581d428bfbf
SHA512884c410d35d451d6712fe6418911784c0bd1580b4274d8ac250d6ce87909381464607494a82a65b553c7a01de9173566c70e613e1d6c93d8a1b18827c1c96fa4
-
Filesize
10KB
MD531e53be66295f414deef8de3c112b867
SHA182e651b51ff8029214f38e1545b80ff2fad3cbee
SHA25647e33749793c1e134a2d1e768d8f8e640138cb641aabea28979450be01dfed18
SHA5120e861dd0f60029db9ab48642066e9dda91b318e07979e57d7155e533d3a31cc76c49598efa7f480f173c9001e230e3b80b69f9308ee9f1ee3cfcba4ff21e09a7