Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/09/2024, 14:32
Static task
static1
Behavioral task
behavioral1
Sample
f0007fa29a8a98f95a545180d3a9a78b_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f0007fa29a8a98f95a545180d3a9a78b_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f0007fa29a8a98f95a545180d3a9a78b_JaffaCakes118.html
-
Size
201KB
-
MD5
f0007fa29a8a98f95a545180d3a9a78b
-
SHA1
8c9048f4c04b363c252375a9dcd5424a9f1a7b25
-
SHA256
0cd5bf92131c1949cf8380e00385e285786f82c9a3d017d850a7355eea8ac98b
-
SHA512
c54fdd72db09e027bc631c11093bed19774a64939d2f900ebdf9f843ea6a8e06eabf0ece3b6768c1bc99bafccc90956e78c7d65068cdf788cb868b1e7ac50247
-
SSDEEP
1536:ka6MqkjiZ93XJjWnrafr4RjX0AOc2DG0KUFneNm/Yb6GvM:d6GjXEtp
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 3160 msedge.exe 3160 msedge.exe 2996 msedge.exe 2996 msedge.exe 5100 identity_helper.exe 5100 identity_helper.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe 436 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe 2996 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2740 2996 msedge.exe 82 PID 2996 wrote to memory of 2740 2996 msedge.exe 82 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3536 2996 msedge.exe 83 PID 2996 wrote to memory of 3160 2996 msedge.exe 84 PID 2996 wrote to memory of 3160 2996 msedge.exe 84 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85 PID 2996 wrote to memory of 3172 2996 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f0007fa29a8a98f95a545180d3a9a78b_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff8540646f8,0x7ff854064708,0x7ff8540647182⤵PID:2740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:3160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:82⤵PID:3172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:3612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3288 /prefetch:12⤵PID:3048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4740 /prefetch:12⤵PID:4752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵PID:3992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=6020 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5604 /prefetch:12⤵PID:4084
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:12⤵PID:3296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5332 /prefetch:12⤵PID:4124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4980 /prefetch:12⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2040,7484734225052504339,1253505406415967528,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=5044 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3792
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3596
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD59e3fc58a8fb86c93d19e1500b873ef6f
SHA1c6aae5f4e26f5570db5e14bba8d5061867a33b56
SHA256828f4eacac1c40b790fd70dbb6fa6ba03dcc681171d9b2a6579626d27837b1c4
SHA512e5e245b56fa82075e060f468a3224cf2ef43f1b6d87f0351a2102d85c7c897e559be4caeaecfdc4059af29fdc674681b61229319dda95cb2ee649b2eb98d313e
-
Filesize
152B
MD527304926d60324abe74d7a4b571c35ea
SHA178b8f92fcaf4a09eaa786bbe33fd1b0222ef29c1
SHA2567039ad5c2b40f4d97c8c2269f4942be13436d739b2e1f8feb7a0c9f9fdb931de
SHA512f5b6181d3f432238c7365f64fc8a373299e23ba8178bcc419471916ef8b23e909787c7c0617ab22e4eb90909c02bd7b84f1386fbc61e2bdb5a0eb474175da4bd
-
Filesize
255B
MD584b28e8ffed9fa0b8f6a91b5b31b308d
SHA1efaf4dff37c34966c481eef0caf7dacee9e2a78c
SHA256cf81f066b1ba1e869f5551bbc61c497d91035e2afcb750c3e63d5c7644b0b29c
SHA512a838f81d13c5ecf02aedcdc60159f4b3f6e22e1f14c566ee3b2765e5645fe0eebabe24124ac018ea64986261c904e5bb50512708babe39bde76d7a5ab9280ea9
-
Filesize
5KB
MD5807e35a24ed5097c12c57a123a6f516b
SHA143723d02ec261fda7507512f828de4aa49e44cef
SHA256e62f8abef7e0149223781437204233705fc663fe08e3d33b87e82f6124cc34b6
SHA5121a6ce7f0f90a9541d915e5234db9ab246bb7af187d1b0087007c3b960c20ccd8ef0765b191913d5c974f87c1c91451d81463a94f7bb152207ff7f796bd87411a
-
Filesize
6KB
MD5b4fe01ff2fe1f2dca65321f3bec60385
SHA10b756304f4d8a7fe79028343fc66aa499939e65a
SHA2565f3e307a9f2da0ae066566a10cce133af79bd0335315398e25fe3fac67d236a2
SHA5126e3643952f380ceba27aeb4b29ae3fdd41c69ee9b95f5c5b23ec24f34af2f15b8696b25ec7c16a14f9af984847a2cbee9826ad838ec78b6304c150a57e2bc81d
-
Filesize
6KB
MD582d60d71dbe800216d1c4aaf6b606e48
SHA11c9e5f6c776e87666aac8586a6beef7f42c0e561
SHA256c1011a18e500317e90cc44e293af4b5018cc1df1fc8866db4b7e6c7f9963d98f
SHA5127f5c1c732a099e4870221687f59498c8b468798184ee0857174c3f82fb08d417932616866850f6a39ca511dc97adb17b9d068008de21b578bb4fbbc79e58a307
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD59cc4bd46199c87c062ce5fe1d0b09a62
SHA1ff4a6042aa7e1595e80a5243ac4b5acad88e8185
SHA256c4ac8eb827194b428be68b8dcf843a1b1242b0c945af83aa1fa8be248b6279e9
SHA512575b0429828a4af3a37cc8a025d1a90d81206dd7b04980eb720a8ce89a749735acf936a67e514ee95ac3127f083b2b54ddfe2e4322a7a05b3b3cd995447a98aa