Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 20:48
Static task
static1
Behavioral task
behavioral1
Sample
fd108b8931ff1712da62df14a5cd1b17_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fd108b8931ff1712da62df14a5cd1b17_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
fd108b8931ff1712da62df14a5cd1b17_JaffaCakes118.html
-
Size
2.3MB
-
MD5
fd108b8931ff1712da62df14a5cd1b17
-
SHA1
660be22ef60df42a413778c81a527e02a82cba0a
-
SHA256
5c31386e9646e71bddc4dc5fba330f11e86adb37840d66443e184e97389deabb
-
SHA512
c19313602169fbc79a5e5ea5c60738b1e2c4fcb15cf59e8a5f7a90e32614143cad3b1612301efe4a013b4eca8a72e6a799fd0d71d4ac1b3093ffe1671791b1db
-
SSDEEP
24576:3+Wt9BJ+Wt9Bq+Wt9BU+Wt9B3X+Wt9Bt+Wt9B1+Wt9B5+Wt9Bi+Wt9BX+Wt9Bz+X:r5
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 5044 msedge.exe 5044 msedge.exe 2736 msedge.exe 2736 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe 3284 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe 2736 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2736 wrote to memory of 3444 2736 msedge.exe 83 PID 2736 wrote to memory of 3444 2736 msedge.exe 83 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 2012 2736 msedge.exe 84 PID 2736 wrote to memory of 5044 2736 msedge.exe 85 PID 2736 wrote to memory of 5044 2736 msedge.exe 85 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86 PID 2736 wrote to memory of 4360 2736 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\fd108b8931ff1712da62df14a5cd1b17_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff83d9846f8,0x7ff83d984708,0x7ff83d9847182⤵PID:3444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4972692702953461181,4695234402349355166,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2144 /prefetch:22⤵PID:2012
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,4972692702953461181,4695234402349355166,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2216 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,4972692702953461181,4695234402349355166,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2800 /prefetch:82⤵PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4972692702953461181,4695234402349355166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:12⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4972692702953461181,4695234402349355166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3316 /prefetch:12⤵PID:1736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2128,4972692702953461181,4695234402349355166,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4236 /prefetch:12⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,4972692702953461181,4695234402349355166,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=904 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3284
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3360
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2828
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD585ba073d7015b6ce7da19235a275f6da
SHA1a23c8c2125e45a0788bac14423ae1f3eab92cf00
SHA2565ad04b8c19bf43b550ad725202f79086168ecccabe791100fba203d9aa27e617
SHA512eb4fd72d7030ea1a25af2b59769b671a5760735fb95d18145f036a8d9e6f42c903b34a7e606046c740c644fab0bb9f5b7335c1869b098f121579e71f10f5a9c3
-
Filesize
152B
MD57de1bbdc1f9cf1a58ae1de4951ce8cb9
SHA1010da169e15457c25bd80ef02d76a940c1210301
SHA2566e390bbc0d03a652516705775e8e9a7b7936312a8a5bea407f9d7d9fa99d957e
SHA512e4a33f2128883e71ab41e803e8b55d0ac17cbc51be3bde42bed157df24f10f34ad264f74ef3254dbe30d253aca03158fde21518c2b78aaa05dae8308b1c5f30c
-
Filesize
318B
MD51fd9ab09ea036f42b1c15e9a62e48129
SHA1436e9569d35fdc6dbf996708060a3d1f6930e683
SHA2561190e2ecb99e0fd6cedbc9f40fee50254af607dd37d39120ca79171deab1dcd9
SHA512bf2aa6d27d918b769e09f982f280c6c50f124cd116d30c915d0062df1ee6572a43dc1c249c0a0bfae6169a4b57cf39acf28f28b493e05be9f6ef14760923821b
-
Filesize
6KB
MD51ea7959e828561cb3a01781b155a1d24
SHA18e5d8c5adfab21ac1be6b521dd586b5701412df4
SHA2566939abd179d611376c85f37f02feae7825b63708e5af64f9d8c4d63bbfb67666
SHA5127ca3b388e1ff70c290f4f771749a997464aa43ed28297fd619122efbea3395164a90a1463526bc1160f5fea125163600374343632ffa528f2624821231b9c7f5
-
Filesize
5KB
MD5e31f903147f36f547df46188adf1deea
SHA1fa3b104f7620430085e24ee95582960c81dfcc25
SHA256d4daae080d5db6df71abed6528c09751b275e8c7d154c1d62a2d04706959574e
SHA5127525fdeb1751daf2ff457847531201a9d9f89e2a7aee223bb03c66e3757907d9333a51d30e26fdf1568be4b488aa787f37090c8c4d24938d32cf61acac763fc3
-
Filesize
10KB
MD5cf38ad9b43580a046536382286a08122
SHA18edd45c3de7e6935d6c3db5f4f80aa6b5790ae6a
SHA256d742611e71785bfed36e1e4f2a0b86faee0e34b9597f3fcf9269135e2cddfdd8
SHA5125bc357bf1bb766662a8ac033d64b8699335a15111e110b240a5f2635b8a23ea814c0c765afb2a3cba96b600ca4403adeb7efdb6090d9c23050219b7d47247a83