Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2024 10:12
Static task
static1
Behavioral task
behavioral1
Sample
ff73f0b015e9a8c55142ecda4ecf3526_JaffaCakes118.html
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ff73f0b015e9a8c55142ecda4ecf3526_JaffaCakes118.html
Resource
win10v2004-20241007-en
General
-
Target
ff73f0b015e9a8c55142ecda4ecf3526_JaffaCakes118.html
-
Size
118KB
-
MD5
ff73f0b015e9a8c55142ecda4ecf3526
-
SHA1
04686076794dd015382692b5928dda7750b54c5c
-
SHA256
dbd41a861f80402286f74aca96b9edb30a70c796144187d740f48c69bb37cb25
-
SHA512
e11b6b90557507c0c85505c01753e0e27378150abe94327b3550e2ae2770b1ecc0d218101ebf5e1aad028a888e1e55688118092995a2208db385f02d83c79d4b
-
SSDEEP
3072:GWDnfSnIoEVyJyJlPIpjXgR/sFbQtW2v6:GWDnfSQMlyv6
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 396 msedge.exe 396 msedge.exe 4600 msedge.exe 4600 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe 1292 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 5 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe 4600 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4600 wrote to memory of 116 4600 msedge.exe 83 PID 4600 wrote to memory of 116 4600 msedge.exe 83 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 1432 4600 msedge.exe 84 PID 4600 wrote to memory of 396 4600 msedge.exe 85 PID 4600 wrote to memory of 396 4600 msedge.exe 85 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86 PID 4600 wrote to memory of 3824 4600 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\ff73f0b015e9a8c55142ecda4ecf3526_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa907c46f8,0x7ffa907c4708,0x7ffa907c47182⤵PID:116
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,2500219289179845301,7068159229651305167,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,2500219289179845301,7068159229651305167,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,2500219289179845301,7068159229651305167,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2900 /prefetch:82⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2500219289179845301,7068159229651305167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3256 /prefetch:12⤵PID:4028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2500219289179845301,7068159229651305167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3276 /prefetch:12⤵PID:1412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2500219289179845301,7068159229651305167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4692 /prefetch:12⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2500219289179845301,7068159229651305167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5340 /prefetch:12⤵PID:2248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,2500219289179845301,7068159229651305167,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4624 /prefetch:12⤵PID:4148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,2500219289179845301,7068159229651305167,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1680 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:1292
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3040
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7cb450b1315c63b1d5d89d98ba22da5
SHA1694005cd9e1a4c54e0b83d0598a8a0c089df1556
SHA25638355fd694faf1223518e40bac1996bdceaf44191214b0a23c4334d5fb07d031
SHA512df04d4f4b77bae447a940b28aeac345b21b299d8d26e28ecbb3c1c9e9a0e07c551e412d545c7dbb147a92c12bad7ae49ac35af021c34b88e2c6c5f7a0b65f6a8
-
Filesize
152B
MD537f660dd4b6ddf23bc37f5c823d1c33a
SHA11c35538aa307a3e09d15519df6ace99674ae428b
SHA2564e2510a1d5a50a94fe4ce0f74932ab780758a8cbdc6d176a9ce8ab92309f26f8
SHA512807b8b8dc9109b6f78fc63655450bf12b9a006ff63e8f29ade8899d45fdf4a6c068c5c46a3efbc4232b9e1e35d6494f00ded5cdb3e235c8a25023bfbd823992d
-
Filesize
871B
MD59e1ea956b1898ec6c372551b6ad96d05
SHA1c18831f6aa1a477a59cc9329bdb91e822a9ff1be
SHA2569c56d686eb44c18556971618ad69c0a82f591459986159dc9f642b1329ad3970
SHA51243a5fdb34c81d2e64bf98ab73b03a272b1e8b868724872b46c950782fd6a6a7e5fd58d83566585cb49103be0b59417d1fc8821c647210ca17c943c5dcde98c57
-
Filesize
7KB
MD529c051acfe614cd55d73f6abe9500138
SHA1ef2d46d8c13ebd6529bc2da6b66fe4b19d314107
SHA25694acec5d1b83531784275f5a25d1e993ba94c1ec6ed6943ac18400e217a379d7
SHA5120df147178ff92f947bd00d698f02c387051f7adf67ffc7b262e849475e1bf00193af977c7c9649bf7261296191bfae017c213c00ca3c79469b3b59c5242f181a
-
Filesize
5KB
MD5d9246775b03aacf58ce3a50a382ccdb1
SHA1e1bb49ca858052fe00b8a1c807180afa50b016ce
SHA2561fca492f9c8acd1520c5c42cae15952d550963daec39145f1d32ba1306b246d5
SHA51271fa89a2ef1ee67029352f2e20fcf7285fc551bd940df71776ed5e9f5ae6742a016b1404658d5fd389a72dc3e4b9b8ed83e01363355d16a5817b2b2707fb4ab7
-
Filesize
10KB
MD5680fdae4de7c84854740d1ee919f4250
SHA17bbade63b4db8033d6afe1e08f8fa7a73daddc3c
SHA2563ce326cbefd04b1d5484d6949c565af2878878a9967ed6c856789cbc9d5dfdcc
SHA512671a7bcf040ef5c37f4a7ae6154b450385afec92dc334cf99378f5f170325dc649006115d3430d586a72a259db4899fabbc2a57546ce35c03c14142908475776