Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
fce4c5e1bcd2e15ce70a7a677ddf82df_JaffaCakes118.html
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fce4c5e1bcd2e15ce70a7a677ddf82df_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
fce4c5e1bcd2e15ce70a7a677ddf82df_JaffaCakes118.html
-
Size
2.3MB
-
MD5
fce4c5e1bcd2e15ce70a7a677ddf82df
-
SHA1
8e7218600ee08b4b73e31b41304c648a10413d81
-
SHA256
0095c917071d049394999f3a7bff88298df7bf05090cd5f8103e7c4121d84328
-
SHA512
bb665ebe3afebaeefe4a0d331fbc04efa0005e4e9efab4230cd24a0a7ac6249695c8f2109cc1b475abb7662a7aac838d44303c5db8c50439263b85f1a744554d
-
SSDEEP
24576:I+Wt9BJ+Wt9Bq+Wt9BU+Wt9BJ+Wt9Bt+Wt9B1+Wt9B5+Wt9Bi+Wt9BX+Wt9Bz+W2:m
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2116 msedge.exe 2116 msedge.exe 2624 msedge.exe 2624 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe 2220 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe 2624 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2624 wrote to memory of 960 2624 msedge.exe 83 PID 2624 wrote to memory of 960 2624 msedge.exe 83 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2228 2624 msedge.exe 84 PID 2624 wrote to memory of 2116 2624 msedge.exe 85 PID 2624 wrote to memory of 2116 2624 msedge.exe 85 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86 PID 2624 wrote to memory of 976 2624 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\fce4c5e1bcd2e15ce70a7a677ddf82df_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd1b3f46f8,0x7ffd1b3f4708,0x7ffd1b3f47182⤵PID:960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1989733910043956814,2635126129016858556,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:22⤵PID:2228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2116,1989733910043956814,2635126129016858556,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2212 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2116,1989733910043956814,2635126129016858556,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2756 /prefetch:82⤵PID:976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1989733910043956814,2635126129016858556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:3052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1989733910043956814,2635126129016858556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2116,1989733910043956814,2635126129016858556,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4644 /prefetch:12⤵PID:4580
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2116,1989733910043956814,2635126129016858556,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3152 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
318B
MD584320bd5f88ef8c6bf8d1259e26b6c37
SHA13a4820a016ab04fc957adc030dcf5ddcad0bbac0
SHA256019cbe60cd79f76cfb2993d55edaf5d82f9e9672e39e0f749ef5bdfeb0ffd680
SHA512dd1a99c922acc046aa8b5806a073bf169ee22666b415d34f83e4e9e89de432e34a323e8b184f625f6144e493049d35be28435ab3f52d59a4026a48c82a413eb8
-
Filesize
5KB
MD58b392f7436deac6152563b93be6cf280
SHA130bc07701ad33529c0c1f5173fc730504b0fc77f
SHA2563ddaaa0c186694ec079f2d5d3877876cdb4d4b337c48e835546207a2578c469d
SHA51219998f85061058a6faaeb886ddb2cd08e40f8c07b09d9300d687bbc879e31894738e3967fb0c43916a5c3cc3b0590fadb48f011efd60b53fa0e15851c46895d6
-
Filesize
6KB
MD531cd36fc0fe0955c2b2e721fa325200d
SHA1776bd133c86ba0c494b2d86f7083898263ef22fb
SHA2564005db7270a6d87f216158b53b05dc15046fc0bdc7f7055b0c69420a10ce41ad
SHA5120d2c95950b68383f62512af263ce09eed952ca7c61df5df7257f02dc350cd0102e3839b4dbc9d4d5d289713745e3ab613703326d1078eece940abe247f053e75
-
Filesize
10KB
MD5850e5eda8af56e26112e293575d916e8
SHA1410347fb94e2f790edb8aed916111756b91e466c
SHA25699c4178f2ee786c996eacd695849204975db0c6d044c56ade6e4561a6d0b6027
SHA5129cba2b927ed9367b592346b484e2b1377c23758d87dbf3d11740fcbb4c2c7e7a118deb8a02a315cf2690dd0d8ced01e44dea309747fb92714975a1513827b8d3