Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 12:19
Static task
static1
Behavioral task
behavioral1
Sample
fb8242e82d1331fcc5dc2e383c0e6eac_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb8242e82d1331fcc5dc2e383c0e6eac_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
fb8242e82d1331fcc5dc2e383c0e6eac_JaffaCakes118.html
-
Size
158KB
-
MD5
fb8242e82d1331fcc5dc2e383c0e6eac
-
SHA1
b1edb404969818e6d9e83c64b0497b6d61815d69
-
SHA256
5c087d321effe153c75272ead946b896cb202ccf0e468cd9eee210955643bd51
-
SHA512
74511b3215175fcc68429e80d534b711876055c2d4aa82a6d70427b7b830bc3801cf88e146950179f1a787a9b9fa6f53b7555c3191e8be493536ccd7f2ef0630
-
SSDEEP
1536:iSRT5yhgfAGsaSyLi+rffMxqNisaQx4V5roEIfGJZN8qbV76EX1UP09weXA3oJrk:igp40SyfkMY+BES09JXAnyrZalI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2300 msedge.exe 2300 msedge.exe 4260 msedge.exe 4260 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 4952 msedge.exe 2348 identity_helper.exe 2348 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe 4260 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4260 wrote to memory of 4824 4260 msedge.exe 83 PID 4260 wrote to memory of 4824 4260 msedge.exe 83 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 4144 4260 msedge.exe 84 PID 4260 wrote to memory of 2300 4260 msedge.exe 85 PID 4260 wrote to memory of 2300 4260 msedge.exe 85 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86 PID 4260 wrote to memory of 1280 4260 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\fb8242e82d1331fcc5dc2e383c0e6eac_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffe56146f8,0x7fffe5614708,0x7fffe56147182⤵PID:4824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,10363821798983507099,1970739392880622686,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2084 /prefetch:22⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2076,10363821798983507099,1970739392880622686,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2172 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2076,10363821798983507099,1970739392880622686,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2808 /prefetch:82⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10363821798983507099,1970739392880622686,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3340 /prefetch:12⤵PID:2380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10363821798983507099,1970739392880622686,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3416 /prefetch:12⤵PID:2056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2076,10363821798983507099,1970739392880622686,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4928 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,10363821798983507099,1970739392880622686,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵PID:3076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2076,10363821798983507099,1970739392880622686,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4988 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10363821798983507099,1970739392880622686,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5216 /prefetch:12⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10363821798983507099,1970739392880622686,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4868 /prefetch:12⤵PID:1648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10363821798983507099,1970739392880622686,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:12⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2076,10363821798983507099,1970739392880622686,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5548 /prefetch:12⤵PID:3112
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4256
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
5KB
MD5984f6a773eb16dab914608bd0c463c3c
SHA114f73a27cbff08f4f1c2aa2453f946700eeaa1fd
SHA256a5800fe2846186c54a1603dfb5b533149ef4b79980ba2144b0c265fbaf93a13c
SHA512bfb5c79537deef67f484ddd05d52062784ea89f07acfca455a4532480f25d4b5849abc6507a3523014cad1cd8ea88a59ea9ccfcef34070783dac4a0ee5ec519c
-
Filesize
6KB
MD514ae98ed47ed5b1c4577b6f0c306bcb5
SHA1dcb75d3efe00159eb1462b74dac412f030b77d01
SHA25627dc48e86940f647f422630bfe60f10558b69dde2acd9c2074bfd0b018acd42f
SHA51289625e56a08b41c0038818bcaa5453754ed0c8e55beda8fd487dffab2e48dd925f9346cd36226c6f54442f67859495d629776d9ba96b386da67e059cdb1b5404
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5737752e873ea18a0cdc97354dd0b957f
SHA1ab33734d68945e443e31b5ffc6937fd1fc921e2a
SHA256edfd975bf60a83134025f0e2ef14d2a0bbfc7989f6266f2279d54f0bfef51356
SHA512ec0fc6924688869f37af4751706957b60de2548efad621cdcd5830e691acdadbbc69e59996a43307759681531115f18da9216f7d30ad8240ccd5dc18e8794bc5