Analysis
-
max time kernel
138s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 21:49
Static task
static1
Behavioral task
behavioral1
Sample
f0adb39504996f87c71507693319b93a_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0adb39504996f87c71507693319b93a_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0adb39504996f87c71507693319b93a_JaffaCakes118.html
-
Size
356KB
-
MD5
f0adb39504996f87c71507693319b93a
-
SHA1
16b2e80b596890017e081921d40fdd381845aaab
-
SHA256
582cd54df9a1efbcae0d8da028e3e641cfd62b3259a2e8c2621b4b6b29362d7a
-
SHA512
2e48ecbfbce2db5168caa5ee9a9a6c0e01ca92e0ffee16034aefc08027112f3d6917ef956d5d5cd8a1a4cd06330bf80f456210d55f7f5600d88fc3794e8034b3
-
SSDEEP
6144:disMYod+X3oI+YvsMYod+X3oI+YjsMYod+X3oI+Yg:q5d+X3t5d+X3V5d+X36
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5064 msedge.exe 5064 msedge.exe 2368 msedge.exe 2368 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 3376 msedge.exe 1040 identity_helper.exe 1040 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 4612 2368 msedge.exe 82 PID 2368 wrote to memory of 4612 2368 msedge.exe 82 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 4544 2368 msedge.exe 83 PID 2368 wrote to memory of 5064 2368 msedge.exe 84 PID 2368 wrote to memory of 5064 2368 msedge.exe 84 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85 PID 2368 wrote to memory of 1940 2368 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f0adb39504996f87c71507693319b93a_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc8c046f8,0x7ffdc8c04708,0x7ffdc8c047182⤵PID:4612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,5637397460421561394,14337744589980914163,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2196 /prefetch:22⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2188,5637397460421561394,14337744589980914163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2256 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2188,5637397460421561394,14337744589980914163,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2328 /prefetch:82⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5637397460421561394,14337744589980914163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:12⤵PID:4284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5637397460421561394,14337744589980914163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3248 /prefetch:12⤵PID:2096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2188,5637397460421561394,14337744589980914163,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1332 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,5637397460421561394,14337744589980914163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2860 /prefetch:82⤵PID:2480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2188,5637397460421561394,14337744589980914163,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2860 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5637397460421561394,14337744589980914163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2600 /prefetch:12⤵PID:4852
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5637397460421561394,14337744589980914163,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4228 /prefetch:12⤵PID:752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5637397460421561394,14337744589980914163,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5856 /prefetch:12⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2188,5637397460421561394,14337744589980914163,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5904 /prefetch:12⤵PID:2316
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2012
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e4f80e7950cbd3bb11257d2000cb885e
SHA110ac643904d539042d8f7aa4a312b13ec2106035
SHA2561184ee8d32d0edecddd93403fb888fad6b3e2a710d37335c3989cc529bc08124
SHA5122b92c9807fdcd937e514d4e7e1cc7c2d3e3aa162099b7289ceac2feea72d1a4afbadf1c09b3075d470efadf9a9edd63e07ea7e7a98d22243e45b3d53473fa4f0
-
Filesize
152B
MD52dc1a9f2f3f8c3cfe51bb29b078166c5
SHA1eaf3c3dad3c8dc6f18dc3e055b415da78b704402
SHA256dcb76fa365c2d9ee213b224a91cdd806d30b1e8652d72a22f2371124fa4479fa
SHA512682061d9cc86a6e5d99d022da776fb554350fc95efbf29cd84c1db4e2b7161b76cd1de48335bcc3a25633079fb0bd412e4f4795ed6291c65e9bc28d95330bb25
-
Filesize
5KB
MD5705078f654d7b10dc55952c40b11f4a4
SHA18a3e2ca214501eb46b68927aa665a1d6ac942686
SHA2567bbc4b666a551035f7f95f81875ea337da1498e130879174514615d3ea070f1e
SHA512206b8b6f8e4ecb4c78f2417cfad87814b0e4ed934703d4a8b2c8e0cf7549de46af4b0727d815c6eab3e98dceb94f4842687dfc25654317d6ebdd0b6cfeb6586a
-
Filesize
6KB
MD5364184ee9dfaf3727598300a89d53d80
SHA119ad26be38d4787af83091844026fc01fd43a4e7
SHA25643d4c583352894e0f90dcbf6a277381a6a0cafd76ebb32af3f6baf25df4a9b78
SHA512534bc94dd7ca1d0d862b91f1983be4f3bb3267fdbf321a613e466174ee6478b7574b5acab1d73571ab987e0ab1f2dad3df419d201b6bdbef1126411e3720f0f2
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f083ddc2-eebc-425b-9dc4-50fea5d916e5.tmp
Filesize6KB
MD51dd2654a05f989f03c2e62bcb6b25763
SHA14aedc90381cae53e041dc41d56031f0895eb609c
SHA25660ec66544b16334891ae5465b80ef5b19f701afee91390ecd9340f30650f8098
SHA512b263fde83cb0579e2f86dc5996f3b4d6343ac2e0b165c0010f783ada43088296a373432e136b60b11ea144e55081e5e3ce951c279af8256558a107d9d21e126d
-
Filesize
10KB
MD5ee159d98ae49b99341aa5cc82f902d8d
SHA1c20b214d230ddd3ca6587cb05da35b1f0779b6e3
SHA256534a951e4e0180fca222936d2fc7bffb60a5b02739b9c6c43cea91a7be28764c
SHA5124f1b677afe81e592ab949ee80717954afe012f39d2d119b4799d1d7e6701c76c9b37a620dc2f8e0c0aa24f0e1d8a36b319ecbe65f21d9f59a276fc593ce62dab