Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
f4f0c9d62276aaee323d610df8dbd1f6_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4f0c9d62276aaee323d610df8dbd1f6_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
f4f0c9d62276aaee323d610df8dbd1f6_JaffaCakes118.html
-
Size
218KB
-
MD5
f4f0c9d62276aaee323d610df8dbd1f6
-
SHA1
38ea5de94dcec039bce3932473b43e17a8681e2d
-
SHA256
d19d1af2540ab412a872e94295f80c79403d1a07a50e8f44a937663f71c8dd99
-
SHA512
740c7c921801cb80da5522042c87a917d32c70ae32cd53ec38195f6f65dcb1df6547ae180275f230230c8434b4f8a749a8cdc39589bdb6f9dd3259f951114d89
-
SSDEEP
3072:SSvr2KnjJoq7pyfkMY+BES09JXAnyrZalI+YQ:SArpnFb7MsMYod+X3oI+YQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2796 msedge.exe 2796 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe 3272 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe 1492 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 3420 1492 msedge.exe 82 PID 1492 wrote to memory of 3420 1492 msedge.exe 82 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 3304 1492 msedge.exe 83 PID 1492 wrote to memory of 2796 1492 msedge.exe 84 PID 1492 wrote to memory of 2796 1492 msedge.exe 84 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85 PID 1492 wrote to memory of 3312 1492 msedge.exe 85
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\f4f0c9d62276aaee323d610df8dbd1f6_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff882f246f8,0x7ff882f24708,0x7ff882f247182⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8111421294170691126,8660761882945438758,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2120 /prefetch:22⤵PID:3304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2108,8111421294170691126,8660761882945438758,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2108,8111421294170691126,8660761882945438758,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1476 /prefetch:82⤵PID:3312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8111421294170691126,8660761882945438758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3228 /prefetch:12⤵PID:60
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2108,8111421294170691126,8660761882945438758,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:12⤵PID:940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2108,8111421294170691126,8660761882945438758,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=4984 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:3272
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2300
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5d7114a6cd851f9bf56cf771c37d664a2
SHA1769c5d04fd83e583f15ab1ef659de8f883ecab8a
SHA256d2c75c7d68c474d4b8847b4ba6cfd09fe90717f46dd398c86483d825a66e977e
SHA51233bdae2305ae98e7c0de576de5a6600bd70a425e7b891d745cba9de992036df1b3d1df9572edb0f89f320e50962d06532dae9491985b6b57fd37d5f46f7a2ff8
-
Filesize
152B
MD5719923124ee00fb57378e0ebcbe894f7
SHA1cc356a7d27b8b27dc33f21bd4990f286ee13a9f9
SHA256aa22ab845fa08c786bd3366ec39f733d5be80e9ac933ed115ff048ff30090808
SHA512a207b6646500d0d504cf70ee10f57948e58dab7f214ad2e7c4af0e7ca23ce1d37c8c745873137e6c55bdcf0f527031a66d9cc54805a0eac3678be6dd497a5bbc
-
Filesize
5KB
MD517dbaaa03cb962658d1440209f5ff725
SHA1986c657e9a1aab40eba8b4a6a828fb7ebe5c6b94
SHA2566638726e12e0c49bae4f782bcab34c64276e9d181f9f6566725f3259284a8450
SHA512faad57ab279c0fa6a63dd52de1c735d818a7e71c6987fe8db16272a742192958039c9ca464ccf3a6b8abdf24d7cffebf63903a640826dfada0b4288f2a6055c3
-
Filesize
6KB
MD5794385a6918df2a08d28ae6073b2a892
SHA1287b3bdcc1849240ae3f93746ca10ca86ac7764e
SHA256d60c89d4cd9c3b7746df90c8e4de0a38d50c14cd251d19bb9cebc1b9ef0507ab
SHA512f2a3aac0a946769895c167e0fc5f61b58e7d5ffa65f708ef4ca2359ba22d2b2e675824a94b63ecdff6905e5cf45bed94233f6c4237a870230f18b3503142bd32
-
Filesize
10KB
MD5c81437c31505a336a8e60ce93461d503
SHA18f74ac0fceb70ec0f02441714c37366580792f03
SHA2564fa70a3009ac3833f90c016c6922666e1338f48fd967d583a4bdb8e4db0ba263
SHA512a9a67ee0d002f207d08e6f68884b53017effbcff68178d2fc56253c25d1a296312644670e9cae60b3fbc60cefb5cef79e7fa6797c9410032cdf5bca29ef35091