Analysis
-
max time kernel
139s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 17:56
Static task
static1
Behavioral task
behavioral1
Sample
f519596545b534f09eb2c7af07107abb_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f519596545b534f09eb2c7af07107abb_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
f519596545b534f09eb2c7af07107abb_JaffaCakes118.html
-
Size
157KB
-
MD5
f519596545b534f09eb2c7af07107abb
-
SHA1
73039d5b9add867b8c79b20a4be3d38683dbe839
-
SHA256
adbb26f7a526db5f8b837815a7cbebbe16d6945cf9fd5c9687f68024156aeff2
-
SHA512
654cfc30afdcd427234d0dc6b9cb35683582bbaa7e07ee6a5f4e03a5f0487f0446d99b472bdc18da5aebdc7e4f249d956b18221a138d1ee0d20d43ce0cef8138
-
SSDEEP
3072:iveZeult7TjbjnAyfkMY+BES09JXAnyrZalI+YQ:ive0ult7Tj9sMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3528 msedge.exe 3528 msedge.exe 3496 msedge.exe 3496 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 4464 msedge.exe 1232 identity_helper.exe 1232 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe 3496 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3496 wrote to memory of 2992 3496 msedge.exe 83 PID 3496 wrote to memory of 2992 3496 msedge.exe 83 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 216 3496 msedge.exe 84 PID 3496 wrote to memory of 3528 3496 msedge.exe 85 PID 3496 wrote to memory of 3528 3496 msedge.exe 85 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86 PID 3496 wrote to memory of 3576 3496 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\f519596545b534f09eb2c7af07107abb_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa3a4146f8,0x7ffa3a414708,0x7ffa3a4147182⤵PID:2992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,7087342903433319246,7967598621673310524,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2108 /prefetch:22⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2084,7087342903433319246,7967598621673310524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2084,7087342903433319246,7967598621673310524,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7087342903433319246,7967598621673310524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3176 /prefetch:12⤵PID:3464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7087342903433319246,7967598621673310524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3192 /prefetch:12⤵PID:1320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2084,7087342903433319246,7967598621673310524,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2552 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,7087342903433319246,7967598621673310524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵PID:3512
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2084,7087342903433319246,7967598621673310524,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5224 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7087342903433319246,7967598621673310524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7087342903433319246,7967598621673310524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5068 /prefetch:12⤵PID:1756
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7087342903433319246,7967598621673310524,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3996 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2084,7087342903433319246,7967598621673310524,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1704
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1196
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
111B
MD5807419ca9a4734feaf8d8563a003b048
SHA1a723c7d60a65886ffa068711f1e900ccc85922a6
SHA256aa10bf07b0d265bed28f2a475f3564d8ddb5e4d4ffee0ab6f3a0cc564907b631
SHA512f10d496ae75db5ba412bd9f17bf0c7da7632db92a3fabf7f24071e40f5759c6a875ad8f3a72bad149da58b3da3b816077df125d0d9f3544adba68c66353d206c
-
Filesize
5KB
MD52aee3fa86da858c91fc379d7882afef9
SHA1a5f45d572811f39db0d49d8fc327bfc57f67f207
SHA256b270129edc09de12c961733b8e7a41581cb780f7243cec0b513f60200ccffab3
SHA51284fe7add853bd7b6dd0550904dcd6c76ea17c3a7da67b3edeb7ffb549008c2a205191c00506b9b1ced8e18e44aac35d929d8cbc869b343004440610abd8586f6
-
Filesize
6KB
MD594f65fa4036653fff09fd238d799702c
SHA13ae49416dd4f2006bf7859b7e59ebae9a9c296b4
SHA256573ce26c5eea52239e5262b9e5f63102477a451cecc2a669786ddc3bd2ebed1a
SHA512df38abe82b8ae809187fe830cd1d310e453c29cb5c3c385e7cf2638eddf9f702112e27c830e7af4364af77caf5e907084d479c715ca813741a577a673ab86eb1
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5c79ba5565a5623482cc10f942e3d942e
SHA15daa7f29036cdb1fc6691d8bcd381e61a3b6c7d2
SHA2569d2458f808ac2cc4c48b4efc99b5b1d97a42edb56b9171dc27af99876046f513
SHA5126f4efc6df3a91ea4c1b03395079cf90d1aca82b898dcf232161ea66c8f785cd84841af074b2dbc3a09f650c1dae3ef7366ad0347a349cf1106d567f902030e80