Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 03:27
Static task
static1
Behavioral task
behavioral1
Sample
f9e97a87dc9c6a5789e9d20942fd04d4_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f9e97a87dc9c6a5789e9d20942fd04d4_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
f9e97a87dc9c6a5789e9d20942fd04d4_JaffaCakes118.html
-
Size
106KB
-
MD5
f9e97a87dc9c6a5789e9d20942fd04d4
-
SHA1
9c180ab687dba8967ec4e238462d14626465f852
-
SHA256
d7606f4111c14354815f83d21e2df9ce9302ff078a8d879f78f5fd2e5cba13ed
-
SHA512
379a80045fd476c8b12e1f2dfd8549f55ae23d6cafe11fe000d1050ee93055a22ec310683b8cf26389bcd9fd6dac148cd4bf1045b449ebbb4c75b0bcc7d4fb11
-
SSDEEP
1536:gEPY6RYZo0GNPNkb1bTNrlQGN2NnNHN8NEWFLN0NZ8Nf9RJ7O+iQqoR:fPJmz1xlG+Q+iQqoR
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4640 msedge.exe 4640 msedge.exe 4752 msedge.exe 4752 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe 1580 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe 4752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4752 wrote to memory of 4468 4752 msedge.exe 83 PID 4752 wrote to memory of 4468 4752 msedge.exe 83 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 2228 4752 msedge.exe 84 PID 4752 wrote to memory of 4640 4752 msedge.exe 85 PID 4752 wrote to memory of 4640 4752 msedge.exe 85 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86 PID 4752 wrote to memory of 2880 4752 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\f9e97a87dc9c6a5789e9d20942fd04d4_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffaf21a46f8,0x7ffaf21a4708,0x7ffaf21a47182⤵PID:4468
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16062657720231183821,5074708271309772728,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2244 /prefetch:22⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2164,16062657720231183821,5074708271309772728,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2296 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2164,16062657720231183821,5074708271309772728,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2732 /prefetch:82⤵PID:2880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16062657720231183821,5074708271309772728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:4092
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2164,16062657720231183821,5074708271309772728,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3268 /prefetch:12⤵PID:5004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2164,16062657720231183821,5074708271309772728,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3920 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1580
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3640
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
1KB
MD5a397bf828a0abb33f06c9462350317ca
SHA19ca4f67c98c83b870f7224a2e6d01f6cfd59f23f
SHA256d63141d10bf4f6b55cf0c598894e43868a11468ea14f4c4e7054fdaa6a664b7a
SHA512cf03f8f90c229918816efe4755c53483d7f38cfe2ee12b03b501986c4df330b01993b7aa5697d333261fd76e8afdd9e397c1a36885a7117ae01af1a6cc8cd9e3
-
Filesize
5KB
MD57269122a48f1d91e5696d63590be3d7b
SHA1fcc058a39d803de093514c2504e51488060ab218
SHA256762b78e27d41c6b5989e415bb64a6b6eb04ed63c33b252736f1876998207446f
SHA51248480a040bcc0997e6bc6b0efe639d240f908ad8dc25fd01376149008ec3279b23525491c91fe9499415554ca4e6107571989ddb399dd05dc37bdcfb64d59701
-
Filesize
7KB
MD5af139a711ae076014e4e94f811b1168a
SHA16274e3e6fe78a8da2c5dd26c74a78417e375628c
SHA2564aed79f66aa61faae26e679a821ed56a1a2313ce8e614fbaa86339640a2b3254
SHA51260b826cf7883912a6c4a548e794f91cc207e956953bca3ec7c6b6db192407efb32c9c1437783fce930ff4502b9d2ddef0c59e3de95add530c2676d30b19da0aa
-
Filesize
10KB
MD5f383d7337b98b660ad796f0b843e47e6
SHA19fdb0651a8006b28384eb8e74d838deed0caec64
SHA256a4f767ed002de2dfd0a43f7f0d59d22e4ee085863be178281cce7f9830b94214
SHA512ba68d675fcfd35c811e802bc6e4a1a96344bc7c28e594eeb634139ed7138bac2611a2d9be22217dfcdcb43f8555fdd34b59ca3f10735a1d95b4a10cd73e3ec25