Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 12:09
Static task
static1
Behavioral task
behavioral1
Sample
f3ef171efe28f5c6435924b931ddbede_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f3ef171efe28f5c6435924b931ddbede_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
f3ef171efe28f5c6435924b931ddbede_JaffaCakes118.html
-
Size
124KB
-
MD5
f3ef171efe28f5c6435924b931ddbede
-
SHA1
ffb821096e9d02628e35805b69cc98ce71315ed2
-
SHA256
4ac5229fc454f7f0de5c6b5affadae3f557e8cedae45952398ac4a594a3359f9
-
SHA512
97df14846adf55474be7ea214931921cf3944e9a8401138243e2c56b6c9ee2cb864a3a5db52cb0786f0d0e238f636393d5359a5f1a96e3949acbe5639d044949
-
SSDEEP
1536:EwRyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrusBTOy9dGCsn:EwRyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3276 msedge.exe 3276 msedge.exe 3888 msedge.exe 3888 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe 1820 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe 3888 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3888 wrote to memory of 3944 3888 msedge.exe 83 PID 3888 wrote to memory of 3944 3888 msedge.exe 83 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 2780 3888 msedge.exe 84 PID 3888 wrote to memory of 3276 3888 msedge.exe 85 PID 3888 wrote to memory of 3276 3888 msedge.exe 85 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86 PID 3888 wrote to memory of 2052 3888 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\f3ef171efe28f5c6435924b931ddbede_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe72d046f8,0x7ffe72d04708,0x7ffe72d047182⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,376476577073345321,17440961580635296399,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2020,376476577073345321,17440961580635296399,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2152 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2020,376476577073345321,17440961580635296399,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2768 /prefetch:82⤵PID:2052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,376476577073345321,17440961580635296399,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:12⤵PID:1204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,376476577073345321,17440961580635296399,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:2224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2020,376476577073345321,17440961580635296399,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3928 /prefetch:12⤵PID:2936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2020,376476577073345321,17440961580635296399,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5144 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1820
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1096
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD599afa4934d1e3c56bbce114b356e8a99
SHA13f0e7a1a28d9d9c06b6663df5d83a65c84d52581
SHA25608e098bb97fd91d815469cdfd5568607a3feca61f18b6b5b9c11b531fde206c8
SHA51276686f30ed68144cf943b80ac10b52c74eee84f197cee3c24ef7845ef44bdb5586b6e530824543deeed59417205ac0e2559808bcb46450504106ac8f4c95b9da
-
Filesize
152B
MD5443a627d539ca4eab732bad0cbe7332b
SHA186b18b906a1acd2a22f4b2c78ac3564c394a9569
SHA2561e1ad9dce141f5f17ea07c7e9c2a65e707c9943f172b9134b0daf9eef25f0dc9
SHA512923b86d75a565c91250110162ce13dd3ef3f6bdde1a83f7af235ed302d4a96b8c9ed722e2152781e699dfcb26bb98afc73f5adb298f8fd673f14c9f28b5f764d
-
Filesize
5KB
MD57edd98c4d31af35f99f0e1fa59e020e8
SHA139198f7402671a8f1d8a99d91b1ff4e1604d1802
SHA256d818b5e3e0b5c80214831d1af1fd58de0b2e6785fa6d8bb331c6a35e863e77b1
SHA512fd664cecf456b763e98deb8dc6b0c9520e866a3b740b80884d7cee455bf98f33ca8cb61dfa05d75a5e9daf01e1128b29f08c32070a0ad83c570c2f29f12ec838
-
Filesize
6KB
MD5fa79d7b6a1185998cb0121a669868db0
SHA1399183dc040fbdb320b9648512d1122e37963fc9
SHA2561efd5cd4d71a4db8a6424c1465b13a0f4270211f8fd39d69abf0cb43fbe5862e
SHA512b2802eba5836998cc7b9fb182aade2d7a0f37707e1409cc608fbd83615ad2a197f8689fa8fbdb5cc10cb635b7089ccc9ba4be10c63fb69396b8e8ec84472d528
-
Filesize
10KB
MD50baa91436be24924d3eafea31cad0554
SHA14d6a17ef56741c3c877bf3247015e8decd7b116d
SHA2562c16dac6abf3c29cc06c7d9f023eaa524a7dd26eb22988fb8ed24ae06408a184
SHA5124f34176240447202d311c05ec59c75161858d52b632576364dd459706bdca3f50f9b711599416b3efc8a1fa984b056f64dca0bceaac56039cf80c4bc28c29966