Analysis
-
max time kernel
139s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-12-2024 08:33
Static task
static1
Behavioral task
behavioral1
Sample
ede899b9a6474939dd5936f789a28f23_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ede899b9a6474939dd5936f789a28f23_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ede899b9a6474939dd5936f789a28f23_JaffaCakes118.html
-
Size
158KB
-
MD5
ede899b9a6474939dd5936f789a28f23
-
SHA1
6a4e732cf927d8d6c5a951144cf8ce60ec0d836e
-
SHA256
dd3ac8d75efc90cb2efded23faf3053df31d83b3284c8c7beab912dedc44a66b
-
SHA512
dd9fbb8628650c46f8db1981b19b4b3431ae6ed9da69027a74fbcaa5645f08ac54c85f39e73468f12d9f786cd1dce4416e5530c072ad44359ccf0380eec82122
-
SSDEEP
1536:iDRTzP6AFN1Dbo4yLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJA:itjo4yfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3740 msedge.exe 3740 msedge.exe 1280 msedge.exe 1280 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 2652 msedge.exe 4496 identity_helper.exe 4496 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe 1280 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1280 wrote to memory of 4560 1280 msedge.exe 83 PID 1280 wrote to memory of 4560 1280 msedge.exe 83 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 5044 1280 msedge.exe 84 PID 1280 wrote to memory of 3740 1280 msedge.exe 85 PID 1280 wrote to memory of 3740 1280 msedge.exe 85 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86 PID 1280 wrote to memory of 3868 1280 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\ede899b9a6474939dd5936f789a28f23_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb315846f8,0x7ffb31584708,0x7ffb315847182⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,14181042289396499554,15589192158979225241,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1980 /prefetch:22⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1968,14181042289396499554,15589192158979225241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2376 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1968,14181042289396499554,15589192158979225241,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2772 /prefetch:82⤵PID:3868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,14181042289396499554,15589192158979225241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3236 /prefetch:12⤵PID:4552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,14181042289396499554,15589192158979225241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:2852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1968,14181042289396499554,15589192158979225241,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1820 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,14181042289396499554,15589192158979225241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3036 /prefetch:82⤵PID:3956
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1968,14181042289396499554,15589192158979225241,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3036 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,14181042289396499554,15589192158979225241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5132 /prefetch:12⤵PID:4680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,14181042289396499554,15589192158979225241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5172 /prefetch:12⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,14181042289396499554,15589192158979225241,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5424 /prefetch:12⤵PID:1524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1968,14181042289396499554,15589192158979225241,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5516 /prefetch:12⤵PID:2180
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4676
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
5KB
MD5529540b2535d0d73968fb4ac37775cee
SHA14e68ad47207356ad2bb467efacf83b78108a3b60
SHA25678ca35f8d19a62e0ed016104730593479d0f71d91511fe8e193b65835b156fe3
SHA5123d9cbe19a86efd2fe9f80a35d8f90a52de780c9d1d00c436a0b0e2fccb1b2762b6faccb18c11fbb042693454c618eb4905ba9481fdd9c957bbca030e4ab0b706
-
Filesize
6KB
MD5c03261b377a52e89fb78ad4ad36f8bea
SHA15c6d76fbc729e1bac7456b210e5986797bd3a96c
SHA256dab588276d4035d400628284cb035beb8098d8fcd220a7ae247f541c042a67f6
SHA512ecc7ff0e906d724fc81951d0d2825c69e2fa7530277cc1dbeb59c6394febac9e37c994eab20cb4b329f2977d6ce88ea992e6d5de8956790c06c19ce3cc596b70
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD51617868fba05a4ec5d57b18e86f31e8a
SHA1187b48de05f20f351a37a205d99a7a4f33bcab3f
SHA25647b708b3acc7588918f9c7aee965cf81dae51b2b0cd7f8295dd355457c5862c8
SHA5126af3175d35799f16456a8c9628e79548636939006b5872b1f19043af307df40f90e9deeea17b39529b13ee77cebae17cdc7e6410c181511f0bf614329323c1fa